5429 lines
230 KiB
Plaintext
5429 lines
230 KiB
Plaintext
![]() |
|
|||
|
Founded By: | _ _______
|
|||
|
Guardian Of Time | __ N.I.A. _ ___ ___ Are you on any WAN? Are
|
|||
|
Judge Dredd | ____ ___ ___ ___ ___ you on Bitnet, Internet
|
|||
|
------------------+ _____ ___ ___ ___ ___ Compuserve, MCI Mail,
|
|||
|
\ / ___ ___ ___ ___ ___________ Sprintmail, Applelink,
|
|||
|
+---------+ ___ ___ ___ ___ ___________ Easynet, MilNet,
|
|||
|
| 20NOV91 | ___ ______ ___ ___ ___ FidoNet, et al.?
|
|||
|
| File 73 | ___ _____ ___ ___ ___ If so please drop us a
|
|||
|
+---------+ ____ _ __ ___ line at
|
|||
|
/ \ ___ _ ___ nia@nuchat.sccsi.com
|
|||
|
------------------+ __
|
|||
|
Editors: | _ Network Information Access
|
|||
|
Judge Dredd | Ignorance, There's No Excuse.
|
|||
|
Lord Macduff |
|
|||
|
------------------+
|
|||
|
|
|||
|
Issue 073 :: Volume 02
|
|||
|
|
|||
|
|
|||
|
"Censorship reflects society's lack of confidence in itself. It is a
|
|||
|
hallmark of an authoritative regime."
|
|||
|
- Supreme Court Justice Potter Stewart
|
|||
|
|
|||
|
|
|||
|
|
|||
|
============================================================================
|
|||
|
1. NIA073 Index ................................................NIA Editors
|
|||
|
2. Valley of the Nerds..........................................Walter Kirn
|
|||
|
3. Internet to Anywhere...................................Industrial Phreak
|
|||
|
4. Globally Tymnet................................................Hi Fi Del
|
|||
|
5. Report on Interexchange Carriers.................................The FCC
|
|||
|
6. Vox Populi: NIA News.........................................Judge Dredd
|
|||
|
7. Hacking the HP3000 [Part I]...................................Malefactor
|
|||
|
8. ** XmasCon '91 Announcement **...............................Santa Claus
|
|||
|
9. Editor's Comments............................................NIA Editors
|
|||
|
============================================================================
|
|||
|
|
|||
|
|
|||
|
|
|||
|
/ /
|
|||
|
/ NIA073 / File 02 /
|
|||
|
/ Valley of the Nerds /
|
|||
|
/ by Walter Kirn /
|
|||
|
/ /
|
|||
|
|
|||
|
[Editor's Note: Walter Kirn has written about Spike Lee and John Updike for
|
|||
|
GQ. He's working in Montana on a new short-story collection.]
|
|||
|
|
|||
|
The keys to our economic future are in the hands of Silicon Valley's young
|
|||
|
computer visionaries. And a lot of those visions are triggered by
|
|||
|
hallucinogens created in labs just yesterday. Welcome to the Second
|
|||
|
Psychedelic Revolution.
|
|||
|
|
|||
|
They call themselves MacAddicts. They are hard-core users of the Apple
|
|||
|
Macintosh personal computer, and they've come to San Francisco by the tens of
|
|||
|
thousands for their annual tribal gathering, the Macworld Expo. Some have on
|
|||
|
suits and carry briefcases. Some have on Grateful Deat T-shirts and carry
|
|||
|
briefcases. More than a few of them look MacStoned.
|
|||
|
|
|||
|
This is not just another convention; in many ways it's a cybernetic Woodstock,
|
|||
|
a be-in for the Information Age. Inside the vast Moscone Center, a dizzying
|
|||
|
sound-and-light show is in progress as corporate exhibitors with names such as
|
|||
|
Gizmo Technologies, MacroMind and Lifetree push their mind-bending wares,
|
|||
|
both hard and soft. The conventioneers stand mesmerized before the pulsing
|
|||
|
VDTs, absorbing each new data rush with giddy nods. A bearded man in an
|
|||
|
ill-fitting sport coat (he looks as if he wearrs a serape at home and subsists
|
|||
|
on ogranic trail mix) stares at a screen aswarm with 3-D graphics and grins
|
|||
|
beatifically. The Mac is beautiful, long live the Mac. Even the Japanese in
|
|||
|
attendance seem caught up in the digital euphoria. There is no doubt about
|
|||
|
it: The Apple PC, conceived in a garage by Stevens Jobs and Wozniak, has
|
|||
|
evolved from a kind of homegrown, countercultural calculator into a
|
|||
|
multibillion-dollar commercial miracle.
|
|||
|
|
|||
|
But the Macintosh is not the only attraction at the Macworld Expo. On the
|
|||
|
sidewalk outside the convention hall, a trollish young man with
|
|||
|
shoulder-length hair and a funky brocade vest is drawing his own adoring
|
|||
|
audience. Ken Goffman, known to his public by the pen name R.U. Sirius, is
|
|||
|
the editor of _Mondo 2000_, a rapidly growing desktop-published glossy
|
|||
|
magazine that documents, among other things, the strange convergence of
|
|||
|
psychedelic-dru use and avant-garde computer science. Recent articles have
|
|||
|
included an interview with Timothy Leary on highter computer conscionsness
|
|||
|
(LSD meets the PC), a rundown of the latest intelligence-boosting
|
|||
|
pharmaceuticals and a talk with medical scientist John Lilly, the inventor of
|
|||
|
the sensory-deprivation tank and the trippy pioneer of human/dolphin
|
|||
|
communication.
|
|||
|
|
|||
|
Today, Goffman has a new issue for sale, and MacAddicts, even the suited,
|
|||
|
Roledexed ones, are lining up to purchase it (at $5.95 a copy) at an
|
|||
|
astonishing rate. Possible thinking I'm with _Mondo_, one of the buyers
|
|||
|
apologizes to me for his Brooks Brothers costume ("My straight clothes")
|
|||
|
techie friends plan to drop 25D, a mild designer hallucinogen, and check out
|
|||
|
musician/computer-head Todd Rundgren's Utopia Grokware products.
|
|||
|
|
|||
|
I look at the man's Macworld Expo badge and see that he's an employee of a
|
|||
|
major San Jose software firm. It doesn't surprise me at all. I've been in
|
|||
|
California for almost two weeks, deep in the psycho-silicon jungle, and I've
|
|||
|
met enough of its denizens to know that the "enemy" in the war on drugs
|
|||
|
includes quite a few of our country's best minds and leading scientific
|
|||
|
innovators. (Jobs, for example, is a self-confessed former acidhead.) If a
|
|||
|
massive nationwide raid were held today, it would net mathematicians,
|
|||
|
inventors, technicians and a multitude of free-lance visionaries--the very
|
|||
|
people we're counting on to beat out the Japanese, renew a stagnant economy
|
|||
|
and generally lead us in to the MacFuture. Indeed, this corps of turned-on
|
|||
|
nerds has already helped to change our lives, providing much of the high-test
|
|||
|
zeal that has joysticked us from the age of heavy industry into the
|
|||
|
point-and-click MacPresent of megabytes and mice, shrinking the modern office
|
|||
|
to the size of a laptop computer and enlarging the laptop computer, via such
|
|||
|
things as modems and networks, into a walkie-talkie for the global village.
|
|||
|
|
|||
|
So before the crackdown goes any farther, perhaps it's time to ask: Can
|
|||
|
America afford to take the "high" out of high technology?
|
|||
|
|
|||
|
Arnie Greif is the sort of young man who free-market conservatives applaud in
|
|||
|
principle but tent to ignore, or even to attack, in practice: a committed,
|
|||
|
free-thinknig entrepreneur. Along with his wife, Sherri, he operates a
|
|||
|
business, FractalVision, out of a modest one-story house in a Los Angeles
|
|||
|
suburb. He keeps a punishing schedule. By day, he toils full-time as a
|
|||
|
systems analyst for a large electronics corporation, then puts in another
|
|||
|
forty or fifty hours a week at the Sun workstation computer in his den.
|
|||
|
Fortunately, the long nocturnal hours are paying off. Unlike most small
|
|||
|
businesses these days, FractalVision is growing and has doubled income every
|
|||
|
year since 1987.
|
|||
|
|
|||
|
Basically, what FractalVision produces is digitized hallucinations. Greif
|
|||
|
pops a tape into his VCR and plays some of the for me. Immediately, the
|
|||
|
screen is suffused with flowing fields of vibrant imagery. The images are
|
|||
|
abstract yet familiar, outrageous yet structured--the sort of shapes people
|
|||
|
often see after taking magic mushrooms. An iridescent snowbank melts away in
|
|||
|
time-lapse motion. Colonies of Martian microbes fuse and mutate and split
|
|||
|
apart. The effect on the viewer is slightly disconcerting; you feel as if
|
|||
|
you're peering into your own brain, watching neutrons fire by the millions.
|
|||
|
Greif explains that the forms are not random but are visual ranslations of
|
|||
|
cretain simple equations fed into his computer. This so-called "fractal
|
|||
|
geometry"--pioneered by Benoit Mandelbrot, an IBM research scientist--governs
|
|||
|
the behavior of natural phenomena from waterfalls to clouds to brainwaves.
|
|||
|
This is the new psychedelia, where math and mysticism mix.
|
|||
|
|
|||
|
"On the Fourth of July, 1979," Greif says, "I stared at a blank white wall. I
|
|||
|
was doing a lot of hallucinogens at the time, and patterns like these are what
|
|||
|
I saw. Later, I discovered fractal geometry and learned that these shapes are
|
|||
|
the building blocks of the universe. Now I am able to reproduce these forms
|
|||
|
mathematically rather than chemically."
|
|||
|
|
|||
|
Arnie goes on to detail the applications of his fractal designs. Some have
|
|||
|
appeared in music videos--in Cher's _Heart of Stone_, for example. Also,
|
|||
|
psychotherapists have used his tapes as relaxation aids for their patients.
|
|||
|
And the principles underlying the designs have implications for acoutic
|
|||
|
science. Currently, he is working with an engineer to improve studio recording
|
|||
|
techniques.
|
|||
|
|
|||
|
Eventually, I ask the 30-year-old Grief if he still trips. It seems like an
|
|||
|
inappropriate question, given the squareness of our surrounding: a living room
|
|||
|
straight out of the Leviz catalogue, strictly suburban sub-modern.
|
|||
|
|
|||
|
"No, but that doesn't mean I won't go out there again," he says, toying with a
|
|||
|
strand of shag run. "I've got kids now, so it's hard, it's hard to find the
|
|||
|
time. I don't really side with the war on drugs, however. Psychedelic drugs
|
|||
|
are like a chef's knife: dangerous in the wrong hands but useful to the
|
|||
|
professional."
|
|||
|
|
|||
|
He nods at the video monitor and adds, "I don't think I could have
|
|||
|
accomplished what I have without them."
|
|||
|
|
|||
|
Among high-tech entrepreneurs, Arnie Greif is not alone in feeling that
|
|||
|
chemicals and achievement really can mix, all those stern public-service
|
|||
|
announcements notwithstanding. Ron Lawrence and Vicki Marshall are the
|
|||
|
founders of a company called KnoWare, a Los Angeles publishing firm and
|
|||
|
Macintosh consultancy. "Whatever problem you're having with the Mac," Ron
|
|||
|
boasts, "we're here to solve it. Day or night." Most recently, KnoWare was
|
|||
|
summoned to troubleshoot the office system of a West Coast fashion magazine.
|
|||
|
|
|||
|
Lawrence, a 45-year-old Vietnam eteran who returned from the war depressed and
|
|||
|
alienated, credits his personal salvation to three forces: the Macintosh
|
|||
|
computer, the writings of Timothy Leary (which KnoWare publishes) and
|
|||
|
psychedelic drugs. "Drugs for me were a catalyst," he says. "By taking
|
|||
|
sychedelics, you clean out the storage banks and have to reprogram yourself.
|
|||
|
Thats what I did. And that's what I do with this baby here." He pats his
|
|||
|
computer as if it were a pet, as if it were part of himself.
|
|||
|
|
|||
|
"Just like with the mind," says Lawrence, "nothing appears on that screen that
|
|||
|
you don't put there. Psychedelics teach you that."
|
|||
|
|
|||
|
David (not his real name) is a graduate of a top East Coast engieering program.
|
|||
|
He commutes from his communal house in Berkeley to a computing job at one of
|
|||
|
America's leading producers of professional video equipment. I interview him in
|
|||
|
|
|||
|
hi home office, where he conducts a sideline business designing custom software
|
|||
|
packages. On the other side of the office door, at the kitchen table, his
|
|||
|
housemates are using razor blades to strip the tough green skin off a large San
|
|||
|
Pedro cactus, hoping to get at the mescaline inside.
|
|||
|
|
|||
|
David's fingers wander lightly over his computer keyboard as he describes the
|
|||
|
appeal of psychoactive drugs for himself and some of his high-tech peers. his
|
|||
|
tranquil, cloistered manner reminds me of a friend of mine--an acidhead Ivy
|
|||
|
League computing major, who, last time I heard from him, was living near Palo
|
|||
|
Alto doing classified Star Wars research.
|
|||
|
|
|||
|
"If you think about it," says David, "the computer is an alien presence. it
|
|||
|
takes a lot of courage to relate to such an amazing machine. Drugs help me to
|
|||
|
overcome my fear of the computer--especially the new drugs. For example, there
|
|||
|
was the time I used U4ia [a long-acting form of amphetamine] to solve a knotty
|
|||
|
programming problem. I'd been stuck on this problem for ages, and the drug help
|
|||
|
|
|||
|
to free up my mind enough so I could see it in a while new way."
|
|||
|
|
|||
|
The new drugs David is referring to come in an almost limitless variety.
|
|||
|
Because the drugs' molecular structures are somewhat malleable and can be
|
|||
|
changed around faster than the DEA can identify them, some of the newest have
|
|||
|
yet to made illegal. A number of the substances are designed and manufactured
|
|||
|
by respectable degree-holding chemists, one of whom is a full professor at a
|
|||
|
prestigious California university. There is MDMA, or ecstasy, which is said to
|
|||
|
evoke Aquarian feelings of love and brotherhood. There is ketamine, a potent
|
|||
|
operating-room anesthetic that I came across maybe a half-dozen times in my
|
|||
|
Silicon Valley travels. Ketamine, says David, "takes you on a submarine ride
|
|||
|
ton the bottom of the universe." Then there is DMT, the _Tyrannosaurus rex_ of
|
|||
|
psychedelics. Usually spoken of by users with a certain wide-eyed, trembling
|
|||
|
awe, DMT has the power, in the words of one programmer i met," to completely
|
|||
|
annihilate your ego in about a minute. Your body falls off like a peeled
|
|||
|
banana skin, and you rocket away in a ray of white light to the edge of known
|
|||
|
existence."
|
|||
|
|
|||
|
Egoless, bodiless white-light astral travel sounds like pretty scary stuff, and
|
|||
|
those who have tried DMT readily admit its perils. One mathematics professor I
|
|||
|
interviewed put it this way: "YOu use the drug three times, and the words 'brain
|
|||
|
|
|||
|
damage' literally appear before your eyes." Indeed, such sober warnings were
|
|||
|
common among the turned-on techies I encountered. For them, drug use is serious
|
|||
|
|
|||
|
business, requiring meticulous preflight preparations. Prior to takeoff, a
|
|||
|
typical user fortifies his system with plenty of fruit juice and vitamins, then
|
|||
|
loads the CD player with congenial music--Bach, perhaps, for thte austerely
|
|||
|
intellectual; the Red Hot Chili Peppers for the more adventurous. He may even
|
|||
|
consult an instruction manual, such as the closely typed four-page leaflet that
|
|||
|
sometimes is provided by hyperresponsible dealers with doses of MDMA ("After an
|
|||
|
MDMA session, great care must be taken in swallowing solid food, since there is
|
|||
|
a minimem amount of anesthesia present..."). In the one DMT "experiment" I
|
|||
|
witnessed, the subject was carefully watched and attended to by a notetaking,
|
|||
|
water-drinking friends--the psychedelic equivalent of a designated driver.
|
|||
|
|
|||
|
In this world of oddly stringent trippers, where so many genious IQs are on the
|
|||
|
line, there is little patience for sloppy procedure. The goal is intellectual
|
|||
|
adventure, not intoxication. Alcohol is widely dismissed as insufficiently
|
|||
|
insight-inducing. Cigarettes are scarce. Cocaine is charged with promoting
|
|||
|
aggression and stupidity. The drug-taking is discreet, almost monklike, and,
|
|||
|
consequently, busts are rare. None of my sources showed any interest in winning
|
|||
|
|
|||
|
converts to higher chemical consciousness, let alone in making money off of drug
|
|||
|
|
|||
|
sales. (Concerned parents will want to note that it doesn't seem likey DMT and
|
|||
|
ketamine will soon appear on your local playground, despite their popularity at
|
|||
|
your local high-tech research park.)
|
|||
|
|
|||
|
Readers may logically wonder at this point just how people like David hold on to
|
|||
|
|
|||
|
thier joob, considering the amount of time they spend riding cosmic submarines.
|
|||
|
What's more, in this age of widespread drug testing, how did they get their job
|
|||
|
in the first place? The answers to these questions lie in the nonconformist,
|
|||
|
fairly hallucinogenic nature of the computer industry itself. In a business
|
|||
|
that seeks to shrink the human mind and put it in a box for easy access, access
|
|||
|
to one's own mind is not a guilty pleasure but something approaching a duty.
|
|||
|
|
|||
|
R.U. Sirius, whose journalistic rounds put him in constant contact with
|
|||
|
Siliconites of all descriptions, says, "In my experience, the most creative
|
|||
|
people in computers experiment with drugs. It's a very bizarre culture, where
|
|||
|
the freaks are the elite. At a company like Autodesk [a cutting edge developer
|
|||
|
of virtual-reality technology], the R&D department includes a little room full
|
|||
|
of people in sandals, with hair down to their ass. At Apple, they buy group
|
|||
|
tickets to the Grateful Dead show at the end of the year."
|
|||
|
|
|||
|
But what about bad trips? What about those terrifying times when the submarine
|
|||
|
fails to surface? R.U.'s answer brims with common sense: "People in those
|
|||
|
fields, if they know what they're doing, seldom freak out. Say that a computer
|
|||
|
person takes some acid now, in 1991, and everything he sees and hears and feels
|
|||
|
in speeding by and changing shape. What's the difference between that and his
|
|||
|
everyday reality?"
|
|||
|
|
|||
|
Chip Krauskopt is the manager of the Human Interface Programat Intel
|
|||
|
Corporation, the nation's top maker of microprocessors and also a Defense
|
|||
|
contractor. He corroborates R.U.'s impressions. That Krauskopf is
|
|||
|
willing--even eager--to speak for attribution underlines Silicon Valley's
|
|||
|
no-sweat attitude toward chemical recreation.
|
|||
|
|
|||
|
"Some of the people here are very, very, very bright," says Krauskopf. "They
|
|||
|
were bored in school, and, as a result, they hung out, took drugs and got into
|
|||
|
computers. A lot of people I know took exactly that path. And remember, this
|
|||
|
is an industry that grew up in the Sixties, so there was never any stigma
|
|||
|
against so-called 'hippies.' People at Intel get judged strictly by how good
|
|||
|
they are. If their skills and arguments are strong, nobody cares if they wear
|
|||
|
tie-dye and sandals."
|
|||
|
|
|||
|
But what about the urine tests often required by the federal government for
|
|||
|
suppliers such as Intel? Don't they weed out the heads? Well, no. For one
|
|||
|
things, urinalysis does not detect most hallucinogens--a fact that led
|
|||
|
cyberessayist Robert Anton Wilson to predict, in Mondo 2000, "The corporate
|
|||
|
structure of the short-term future will therefore this our the ranks of pot
|
|||
|
smokers and coke freaks while the acid heads climb merrily upward in the
|
|||
|
heirarchy." Furthermore, the tests can pick up only relatively high
|
|||
|
concentrations of drugs, and Intel's executives virtually see to it that
|
|||
|
potential employees have an opportunity to clean up their act, at least
|
|||
|
temporarily, before their pee is screened.
|
|||
|
|
|||
|
"We tell candidates when they first come in for an interview that eventually
|
|||
|
they will be tested," says Krauskopf. "The levels that are tested at, you see,
|
|||
|
are such that you have to have taken drugs in the past forty-eight hours.
|
|||
|
Unless you're a total idiot and do drugs every day, you're going to test clean."
|
|||
|
|
|||
|
|
|||
|
If this comes as disturbing news to the straitlaced--the idea that inside the
|
|||
|
high inside the high-tech core of everything from your office PC to the guidance
|
|||
|
|
|||
|
system of the Patriot missle lurks a psychedelic genie--just consider the
|
|||
|
alternative. If the drug testing were effective and if it had begun, say,
|
|||
|
twenty-five years ago, chances are that some of our country's most vital
|
|||
|
industries might not exist today. Software magnate Mitch Kapor, founder of
|
|||
|
Lotus Development, whose 1-2-3 spreadsheet forever changed accounting, has
|
|||
|
publicly credited "recreational chemicals" with helping him form his business
|
|||
|
outlook. David Bunnell, who started PC Magazine and helped create the Altair,
|
|||
|
oe of the first personal computers, remembers his co-poineers as looking as if
|
|||
|
"they were just coming down off a ten-year acid trip." (One of Bunnell's hippie
|
|||
|
|
|||
|
colleagues, Microsoft's Bill Gates, is now one of the country's richest
|
|||
|
individuals, worth more than $4 billion.)
|
|||
|
|
|||
|
It's time to face fact, America. With our buttoned-down financiers in prison,
|
|||
|
our uptight bankers in bankruptcy and our automotive titans in retreat, perhaps
|
|||
|
our freaks are our last, best hope. And it's not that they've been co-opted by
|
|||
|
the system--they've co-opted it. Yesterday's dropouts, in many cases, are
|
|||
|
todays insiders, and some of today's head honchos are heads.
|
|||
|
But what about tommorrow?
|
|||
|
|
|||
|
If you're looking for a prophet of the scientific future, you could do worse
|
|||
|
than mathematician Ralph Abraham, a shaggy middle-aged professor at the
|
|||
|
University of California, Santa Cruz, who can use the word "grok" in casual
|
|||
|
conversation and get away with it. Abraham's revolutionary specialty, in which
|
|||
|
he is an acknowledged leader, has come to be known as "chaos math" or "dynamical
|
|||
|
|
|||
|
system theory." What people such as Abraham try to do is graph and predict,
|
|||
|
with the help of computers, seemingly unpredictable events: global climatic
|
|||
|
change, the rise and fall of financial markets, even the social origins of war.
|
|||
|
What makes this math revolutionary, of course, is that no one has really
|
|||
|
mastered it yet, although aficianados believe it can be mastered and that the
|
|||
|
attempt is eminently worht making.
|
|||
|
|
|||
|
The driving idea behind chaos math--that there is order in randomness and
|
|||
|
randomness in order--sounds like one of those drug-induced epiphanies you scrawl
|
|||
|
|
|||
|
on a napkin at 3am and then throw away the next day. Well, in a rather literal
|
|||
|
sense, it is a drug-inspired notion, except that ralph Abraham kept the napkin
|
|||
|
and has been doodling on it ever since.
|
|||
|
|
|||
|
"In the 1960s," he says, "a lot of people on the frontiers of math experimented
|
|||
|
with psychedelic substances. There was a brief and extremely creative kiss
|
|||
|
between the community of hippies and top mathematics. I know this because I was
|
|||
|
|
|||
|
a purveyor of psychedelics to the mathematical community."
|
|||
|
|
|||
|
Math and acid--not, on would think, a natural combination. It's like hearing a
|
|||
|
champion marathon runner credit his success to chain-smoking Camels. I'm
|
|||
|
confused. The image of a frying egg ("This is your brain on drugs") flashes in
|
|||
|
my mind's eye.
|
|||
|
|
|||
|
Abraham explains, "To be creative in mathematics, you have to start from a point
|
|||
|
|
|||
|
of total oblivion. Basically, math is revealed in a totally unconscious process
|
|||
|
|
|||
|
in which one is completely ignorant of the social climate. And mathematical
|
|||
|
advance has always been the motor behind the advancement of consciousness.
|
|||
|
What's going on now with dynamical systems theory is at least big a thing as the
|
|||
|
|
|||
|
invention of the wheel."
|
|||
|
|
|||
|
He glances at his desk, at the ubiquitous Macintosh sitting the, with its blind
|
|||
|
gray screen. "Without this machine, of course," says Abraham, "what we're doing
|
|||
|
|
|||
|
now would not be possible. The computer extends our intellect, which helps us
|
|||
|
create the future. It offers a door to perceiving complex space-time
|
|||
|
realities."
|
|||
|
|
|||
|
Abraham explains, "To be creative in mathematics, you have to start from a point
|
|||
|
|
|||
|
of total oblivion. Basically, math is revealed in a totally unconscious process
|
|||
|
|
|||
|
in which one is completely ignorant of the social climate. And mathematical
|
|||
|
advance has always been the motor behind the advancement of consciousness.
|
|||
|
What's going on now with dynamical systems theory is at least as big a thing as
|
|||
|
the invention of the wheel."
|
|||
|
|
|||
|
He glances at his desk, at the ubiquitous Macintosh sitting there, with its
|
|||
|
blind gray screen. "Without this machine, of course," says Abraham, "what we're
|
|||
|
|
|||
|
doing now would not be possible. The computer extends our intellect, which
|
|||
|
helps us create the future. It offers a door of perception were cleansed every
|
|||
|
thing would appear to man as it is, infinite." But what, according to Abraham,
|
|||
|
will all this infinite portal-cleansing bring? Nothing less, he predicts, than
|
|||
|
global peace.
|
|||
|
|
|||
|
"Social science, up until now, has not been very scientific. Now, with
|
|||
|
computers and the new mathematics, we may be able to change that. Soon we may
|
|||
|
be able to map and manipulate a certain set of parametes--social, cultural,
|
|||
|
economic, geographical--that will help us to anticipate and mediate
|
|||
|
international conflict. Loving on the largest possible scale will be enhanced
|
|||
|
by the intellectual capability to understand the complexity of the systems in
|
|||
|
which we live."
|
|||
|
Spoken like a true Macflower child.
|
|||
|
|
|||
|
They are sitting in a darkened Berkeley living room, talking about virtual
|
|||
|
reality and smoking the milder, powdered form of ketamine. I'm with them but
|
|||
|
not with them, if you catch my drift. The ketamite is a bit way-out for me, and
|
|||
|
|
|||
|
the conversation too. Because I don't wish these folks legal hassles, I won't
|
|||
|
say who they are, just that they know a lot about computers (on man runs a
|
|||
|
thriving electronics research firm) and more than a thing or two about drugs.
|
|||
|
|
|||
|
Their speech, in case you're wondering, as perfectly coherent. Alarmingly
|
|||
|
coherent, when you consider its content.
|
|||
|
|
|||
|
"You know that telephone-company saving," someone pipes up from the couch,
|
|||
|
" `Reach out and touch someone'? Well, soon, with the help of virtual reality,
|
|||
|
you will be able to do that, literally. You'll wear a kind of bodysuit with
|
|||
|
hundreds of little sensors and vibrators. You'll plug it into your computer,
|
|||
|
your partner across the country will plug in too, and you'll be able to feel
|
|||
|
each other up by moving around in the suits. There's a term for it already,
|
|||
|
`teledildonics.' The phenomenon of long-distance sex."
|
|||
|
|
|||
|
The beautiful young woman sitting beside him--she's a computer musician, and we
|
|||
|
have just finished listening to her tape--takes a hit of ketamine, then says,
|
|||
|
"Perfect. No diseases. No unwanted pregnancies."
|
|||
|
|
|||
|
"Here's something else," says another young man. "It's very, very possible that
|
|||
|
|
|||
|
someday we will be able to transfer the contents of our brains straight onto a
|
|||
|
microchip."
|
|||
|
|
|||
|
"Why?" I ask. "Why wouuld we want to do something like that?"
|
|||
|
|
|||
|
"Come on," he says, "we do it already. We do it all the time, whenever we type
|
|||
|
our ideas into a compter. In the future, we'll just do it faster, more
|
|||
|
directly."
|
|||
|
|
|||
|
I concede that, yes, it's a thought. They're all thoughts. Teledildonics,
|
|||
|
that's a thought too.
|
|||
|
|
|||
|
And as the room fills up with thoughts--Utopian, stange, inspiring,
|
|||
|
ridiculous--it strikes me that this is precisely what Americans are supposed to
|
|||
|
do: think freely, then try to apply those thoughts, skeptics and solid citizens
|
|||
|
|
|||
|
be damned. Ford did it, Eddison did it, Jobs and Wozniak did it, Eddison did
|
|||
|
it, Ralph Abraham is doing it now. It's what we're good at and, coincidentally,
|
|||
|
|
|||
|
what some of our international competitors--with their ancient social rule books
|
|||
|
|
|||
|
and close-order corporate calisthenic sessions--aren't so good at. In his
|
|||
|
recent book, _More Like Us_, Japan expert James Fallows argued convincingly
|
|||
|
that instead of trying tto ape Japan's regimented industrial economy, the United
|
|||
|
|
|||
|
States would do better to unleash its individualistic potential. This may be
|
|||
|
another way of saying that weirdness can be an export commodity.
|
|||
|
|
|||
|
Timothy Leary, who has welcomed the computer revolution with his characteristic
|
|||
|
cosmic enthusiasm, agrees. While Leary may be a prophet without honor in his
|
|||
|
own country, the Japanese think otherwise, and he is much in demand there as a
|
|||
|
lecturer and cultural consultant. "Japan is a tightly structured hive society,
|
|||
|
and they knokw it," says Leary. "So just as they go the Middle East for oil and
|
|||
|
|
|||
|
Australia for wood, they come to California for creativity. They realize that
|
|||
|
creativity is a raw resource and that we have an abundance of it here."
|
|||
|
|
|||
|
Part of the recipe for that abundance, like it or not, is chemical. When
|
|||
|
encountering some bizarre high-tech marvel, we often that we suspect, we're
|
|||
|
right. And how should we react to this? Is say: as tolerantly and calmly as
|
|||
|
possible. A little brain damage, in the end, may be a small price to pay for
|
|||
|
major brainstorms. And it's not as if we could stop these people even if we
|
|||
|
wanted to. As ever, the pioneers will continue to pioneer, assuming whatever
|
|||
|
risks they deem necessary. Judge them not by the trips they take but by the
|
|||
|
gifts they carry back.
|
|||
|
|
|||
|
============================================================================
|
|||
|
|
|||
|
|
|||
|
/ /
|
|||
|
/ NIA073 / File 03 /
|
|||
|
/ Internet 2 Anywhere /
|
|||
|
/ Industrial Phreak /
|
|||
|
/ /
|
|||
|
|
|||
|
In the last issue of Phrack magazine was published the uucp to
|
|||
|
compuserve gateway material. In light of the recent happenings of
|
|||
|
Phrack magazine I have decided to write the uucp to anywhere material
|
|||
|
and send it to NIA. This file will tell you how to recieve and send mail
|
|||
|
to everywhere reachable from internet. This is meant for those just starting
|
|||
|
on using the internet and thus the experienced users
|
|||
|
and dry. --Industrial Phreak
|
|||
|
|
|||
|
Current networks that are connected by a gateway are as follows:
|
|||
|
|
|||
|
applelink AppleLink (Apple Computer, Inc.'s in-house network)
|
|||
|
attmail AT&T Mail,AT&T's commercial e-mail service.
|
|||
|
bitnet international academic network
|
|||
|
bix Byte Information eXchange: Byte magazine's commercial BBS
|
|||
|
bmug Berkeley Macintosh Users Group
|
|||
|
compuserve commercial time-sharing service
|
|||
|
connect Connect Professional Information Network (commercial)
|
|||
|
easynet Easynet (DEC's in-house mail system)
|
|||
|
envoy Envoy-100 (Canadian commercial mail service)
|
|||
|
fax Facsimile document transmission
|
|||
|
fidonet PC-based BBS network
|
|||
|
geonet GeoNet Mailbox Systems (commercial)
|
|||
|
internet the Internet
|
|||
|
mci MCI's commercial electronic mail service
|
|||
|
mfenet Magnetic Fusion Energy Network
|
|||
|
nasamail NASA internal electronic mail
|
|||
|
peacenet non-profit mail service
|
|||
|
sinet Schlumberger Information NETwork
|
|||
|
span Space Physics Analysis Network (includes HEPnet)
|
|||
|
sprintmail Sprint's commercial mail service (formerly Telemail)
|
|||
|
thenet Texas Higher Education Network
|
|||
|
|
|||
|
Ok, here goes the rest:
|
|||
|
|
|||
|
I'm at: applelink
|
|||
|
You're at: internet
|
|||
|
To mail you i write to "user@domain@internet#" in which the domian can
|
|||
|
be the form of "site.bitnet" w/the address being less than 35 characters
|
|||
|
|
|||
|
I'm at: AT&T Mail (Herein: attmail)
|
|||
|
You're at: internet
|
|||
|
To mail you I write to "internet!domain!user". For any problems contact
|
|||
|
the AT&T Mail Customer Assistance Center at 1.800.MAIL.672
|
|||
|
|
|||
|
I'm at: bitnet
|
|||
|
You're at: internet
|
|||
|
There are a few ways of doing this depending upon your software. In
|
|||
|
most cases "user@domain" should work. If this doesn't, try
|
|||
|
"user%domain@gateway" where "gateway" is a regional Bitnet-Internet
|
|||
|
gateway site.
|
|||
|
|
|||
|
I'm at: compuserve
|
|||
|
You're at: fax machine
|
|||
|
To send you something I simply send (in USA only) "FAX number". If you
|
|||
|
were at the number +1 512 666 1234 then in the number field I would put
|
|||
|
"15126661234". Not difficult.
|
|||
|
|
|||
|
I'm at: compuserve
|
|||
|
You're at: mci
|
|||
|
If your address at mci was 666-6969 I would put ">MCIMAIL:666-6969".
|
|||
|
|
|||
|
I'm at: connect
|
|||
|
You're at: internet
|
|||
|
I would send to CONNECT id "DASNET" and on the first line of the message
|
|||
|
put "\"user@domain\"@DASNET"
|
|||
|
|
|||
|
I'm at: easynet
|
|||
|
You're at: bitnet
|
|||
|
The gateway is DECWRL::ADMIN. Therefore from VMS use NMAIL to send to
|
|||
|
"nm%DECWRL::\"user@site.bitnet\"". From Unix send to "user@site.bitnet"
|
|||
|
or if that fails send (via IP) "\"user%site.bitnet\"@decwrl.dec.com"
|
|||
|
or (via DECNET) send "DECWRL::\"user@site.bitnet\""
|
|||
|
|
|||
|
I'm at: envoy
|
|||
|
You're at: internet
|
|||
|
The gateway is ICS.TEST or ICS.BOARD. Therefore send to
|
|||
|
"[RFC-822=\"user(a)domain\"]INTERNET/TELEMAIL/US" and for special
|
|||
|
characters use @=(a) !=(b) _=(u) any=(three octal digits)
|
|||
|
|
|||
|
I'm at: fidonet
|
|||
|
You're at: internet
|
|||
|
Just send to "uucp" at the nearest gateway site and in the first line
|
|||
|
put "To: user@domain"
|
|||
|
|
|||
|
I'm at: geonet
|
|||
|
You're at: internet
|
|||
|
I would send to "DASNET" and in the subject line put
|
|||
|
"user@domain!subject"
|
|||
|
|
|||
|
I'm at: GSFCMail
|
|||
|
You're at: internet
|
|||
|
The nearest gateway is cust.svc. Therefore at the "To:" type POSTMAN
|
|||
|
and at the first line of your message enter "To: user@domain"
|
|||
|
|
|||
|
I'm at: GSFCMail
|
|||
|
You're at: NASAMAIL
|
|||
|
The gateway is cust.svc so send to
|
|||
|
"(C:USA,ADMD:TELEMAIL,P:NASAMAIL,O:NASA,UN:userid)"
|
|||
|
|
|||
|
I'm at: GSFCMail
|
|||
|
You're at: span (now nsi-decnet)
|
|||
|
The gateway is cust.svc. At the "To:" type "POSTMAIN" and in the first
|
|||
|
line of the message type "To: user@host.SPAN.NASA.GOV" or use GSFCCNE
|
|||
|
gateway and send it to
|
|||
|
(C:USA,ADMD:TELEMAIL,P:GSFCCNE,O:SPAN,OU:host,SN:user)
|
|||
|
|
|||
|
I'm at: GSFCMail
|
|||
|
You're at: sprintmail
|
|||
|
For public networks send it to
|
|||
|
"(C:USA,ADMD:TELEMAIL,O:organization,UN:userid)"
|
|||
|
and for private networkds send it to
|
|||
|
"(C:USA,ADMD:TELEMAIL,PRMD:private_net,O:organization,UH:userid)"
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: applelink
|
|||
|
Just send it to "user@applelink.apple.com"
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: attmail
|
|||
|
Again just send it to "user@attmail.com"
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: bitnet
|
|||
|
I would send it to "user%site.bitnet@gateway" where gateway is the
|
|||
|
gateway host like cunyvm.cuny.edu or mitvma.mit.edu.
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: bix
|
|||
|
Just send it to "user@dcibix.das.net"
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: bmug
|
|||
|
If your name was Jack Off then I would send it to
|
|||
|
"Jack.Off@bmug.fidonet.org"
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: compuserve
|
|||
|
If your ID was "76969.666" then I would send it to
|
|||
|
"76969.666@compuserve.com"
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: connect
|
|||
|
If your NAME was JACK the I'd send it to "JACK@dcjcon.das.net"
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: easynet
|
|||
|
Your field is HOST::USER so I would send it to "user@host.enet.dec.com"
|
|||
|
or "user%host.enet@decwrl.dec.com".
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: easynet
|
|||
|
Lets say you're Jack Off @CUM, then I would send it to
|
|||
|
"Jack.Off@CUM.MTSMDEC.COM"
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: econet
|
|||
|
The gateway is <support@igc.org> so I would send to "user@igc.org".
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: envoy
|
|||
|
I'd send to "att!attmail!mhs!envoy!userid@UUNET.UU.NET" or if that
|
|||
|
didn't work thru US Sprint's X.400 gateway to
|
|||
|
"/C=CA/ADMD=TELECOM.CANADA/O=ENVOY/DD.ID=userid/@SPRINT.COM"
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: fidonet
|
|||
|
If you were jack off at 1:2/13:69 then I'd send to
|
|||
|
"jack.off@p69.f13.n2.z1.fidonet.org"
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: geonet
|
|||
|
I'd send to "user:host@map.das.net". [NOTE: the American host is geo4
|
|||
|
and European host is geo1].
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: GSFCMail
|
|||
|
The gateway is postmaster@ames.arc.nasa.gov so I'd send to
|
|||
|
"user@GSFCMAIL.NASA.GOV"
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: mci
|
|||
|
You're Jack Off (123-4567) I'd send to "1234567@mcimail.com".
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: mfenet
|
|||
|
Then I'd send to "user%mfenode.mfenet@nmfecc.arpa"
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: nasamail
|
|||
|
The gateway is <postmaster@ames.arc.nasa.gov> so I'd send it to
|
|||
|
"user@nasamail.nasa.gov"
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: peacenet
|
|||
|
The gateway is <support@igc.org> so I'd send it to "user@igc.org".
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: signet (through FidoNet)
|
|||
|
Ok, you're Jack Off again at 1:2/13:69 send it to
|
|||
|
Jack.Off@f527.n2.z2.fidonet.org (thats the Fido-SigNet gateway) and in
|
|||
|
the first line put "@DOMAIN SIGNet 1:2/13:69 FidoNet 2:2/527". [NOTE:
|
|||
|
The sysop of the gateway can be reached
|
|||
|
"andreas.levenitschnig@f527.n2.z2.fidonet.org".
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: sinet
|
|||
|
Your fields are node::user or node1::node::user so send to
|
|||
|
"user@node.SINet.SLB.COM" or "user%node@node1.SINet.SLB.COM"
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: span (now nsi-decnet)
|
|||
|
Your field is host::user and the gateway is netmgr@nssdca.gsfc.nasa.gov
|
|||
|
so send to "user@host.SPAN.NASA.GOV"
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: sprintmail
|
|||
|
The gateway is postmaster@sprint.com so for public networks send to
|
|||
|
"/C=US/ADMD=TELEMAIL/O=organization/DD.UN=userid/@SPRINT.COM"
|
|||
|
or if you know the recipients registered full name
|
|||
|
"/C=US/ADMD=TELEMAIL/O=organization/PN=firstname.lastname/@SPRINT.COM"
|
|||
|
for private networks send to
|
|||
|
"/C=USA/ADMD=TELEMAIL/PRMD=private_net/O=organization/DD.UN=userid/@SPRINT.COM"
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: thenet
|
|||
|
Send to "user%host.decnet@utadnx.cc.utexas.edu"
|
|||
|
|
|||
|
I'm at: internet
|
|||
|
You're at: uninet (South Africa) (Thru FidoNet)
|
|||
|
Send the message to user.node@f4.n494.z5.fidonet.org (a list of uninet
|
|||
|
nodes can be obtained with a SEND UNINODE)
|
|||
|
|
|||
|
I'm at: mci
|
|||
|
You're at: internet
|
|||
|
At the "To" prompt type "Jack Off (EMS)" at "EMS:" type "internet" and
|
|||
|
at the "Mbx:" type "user@domian".
|
|||
|
|
|||
|
I'm at: nasamail
|
|||
|
You're at: internet
|
|||
|
At the "To:" prompt type "POSTMAN" and at the "Text:" (i.e. as the first
|
|||
|
line of your message) enter "To: user@domain".
|
|||
|
|
|||
|
I'm at: sinet
|
|||
|
You're at: internet
|
|||
|
Send it to "M_MAILNOW::M_INTERNET::\"user@domain\"" or
|
|||
|
"M_MAILNOW::M_INTERNET::domain::user"
|
|||
|
|
|||
|
I'm at: span (now nsi-decnet)
|
|||
|
You're at: GSFCMain
|
|||
|
The gateway is mssdca::netmgr so send to
|
|||
|
"AMES::\"user@GSFCMAIL.NASA.GOV"\"
|
|||
|
|
|||
|
I'm at: span
|
|||
|
You're at: internet
|
|||
|
The gateway is nssdca::netmgr so send it to "AMES::\"user@domain\""
|
|||
|
|
|||
|
I'm at: sprintmail
|
|||
|
You're at: internet
|
|||
|
The gateway is (c:usa,admd:telemail,o:telenet.tele,fn:technical,sn:support,i:t)
|
|||
|
so send to "(C:USA,ADMD:TELEMAIl,PRMD:INTERNET,ID:<user(a)domain>)"
|
|||
|
|
|||
|
I'm at: thenet
|
|||
|
You're at: internet
|
|||
|
So you send it to "UTADNX::WINS%" user@domain "
|
|||
|
|
|||
|
|
|||
|
Networks not connected American Online, British Telecom Gold, DialCom,
|
|||
|
Dialog, Easylink, Eurokom, Fidelity Investments, GEnie, GoldNet, HandsNet,
|
|||
|
Midas Internation HQ, Nifty-Serve, OMNET (thru CMR send mail to OMNET users
|
|||
|
by "[omnet.user/OMNET]MAIL/USA%TELEMAIL"@Inetermail.ISI.EDU", Paranet,
|
|||
|
PC-Relay, Prodigy [thank god], PROFS (general), PROFS (IBM), QUICK-COMM, SABRE,
|
|||
|
Telemail, VNET.
|
|||
|
|
|||
|
For comments on the file I can be found on internet at uk05769@ukpr.uky.edu
|
|||
|
Ciao!
|
|||
|
|
|||
|
|
|||
|
/ /
|
|||
|
/ NIA073 / File 04 /
|
|||
|
/ Globally Tymnet [01/02] /
|
|||
|
/ by Hi Fi Del /
|
|||
|
/ /
|
|||
|
|
|||
|
The following countries and their connections with Tymnet I have
|
|||
|
organized information on. This is in list/table type format. These countries
|
|||
|
are detailed: Jamaca, Japan, Kuwait, Luxembourg, Malaysia, Mexico, Netherlands
|
|||
|
and New Zealand. For those of ya' that don't know very much about Tymnet,
|
|||
|
see one of the numerous files that have been done on the basics. Enjoy!
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- JAMAICA ---
|
|||
|
|
|||
|
JAMAICA - ENHANCED GLOBAL CONNECTION SERVICE
|
|||
|
|
|||
|
|
|||
|
1. TYMUSA Gateway Host Number: 5368
|
|||
|
2. Node Number: 3676
|
|||
|
3. Rates: $10.00/hour and $.50/Kchar
|
|||
|
4. Dialup Locations and Numbers:
|
|||
|
(1.809) 924-9915 300/1200 Bps Bell 212A
|
|||
|
5. Trouble Reporting Center:
|
|||
|
Support (local)
|
|||
|
phone: (1.809) 921 5312
|
|||
|
Hours of Operation: 24hrs
|
|||
|
Contact:
|
|||
|
|
|||
|
|
|||
|
JAMAICA - BASIC GLOBAL CONNECTION SERVICE
|
|||
|
|
|||
|
|
|||
|
Jamaica International Telecommunications Ltd. Net. Name: JAMANTEL
|
|||
|
15, North Street DNIC: 3380
|
|||
|
P.O. Box 138
|
|||
|
Kingston, Jamaica
|
|||
|
Contact: Mr. Rickards (809) 921-5316/922-6063
|
|||
|
Telex: (381) 112
|
|||
|
OnTyme: INTL.JAMINTELCOMM
|
|||
|
|
|||
|
1. ACCESS/SPEEDS: Async dial-in/leased speeds: 300-1200 bps
|
|||
|
Synchronous leased speeds: 2400-9600 bps
|
|||
|
|
|||
|
2. PROTOCOLS: Async terminal interface, Sync X.25
|
|||
|
|
|||
|
3. PRICES: All Prices are in Jamaican Dollars.
|
|||
|
(1 $ U.S. = 5.35 Jam. $)
|
|||
|
Connect time: $ .75/minute
|
|||
|
Transmission: $ 2.25/Kchar.
|
|||
|
|
|||
|
4. COMMENTS: n/a
|
|||
|
|
|||
|
--------------- OPERATIONAL/TECHNICAL INFORMATION -------------------
|
|||
|
|
|||
|
1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
|
|||
|
Contact: Trouble Reporting
|
|||
|
Hours of Operation: 24hrs
|
|||
|
Phone: (809) 921 5312
|
|||
|
Fax: (809) 921 5329
|
|||
|
Ontyme: INTL.JAMINTEL
|
|||
|
|
|||
|
2. SERVICE INFORMATION ADDRESS:
|
|||
|
|
|||
|
3. TEST ADDRESS:
|
|||
|
|
|||
|
4. ASYNC ACCESS PROCEDURES:
|
|||
|
|
|||
|
LOGON:
|
|||
|
|
|||
|
TYMNET STYLE "please log in: "
|
|||
|
|
|||
|
5. TYMUSA AVAILABLE: Yes
|
|||
|
|
|||
|
6. DEFAULT PAD SETTINGS:
|
|||
|
|
|||
|
7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS:
|
|||
|
|
|||
|
City/Territory Modem/Speed Access Number
|
|||
|
-----------------------------------------------------------------
|
|||
|
Kingston Bell 212A/300-1200bps (809)924-9915
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- JAPAN ---
|
|||
|
|
|||
|
JAPAN (NIS) - ENHANCED GLOBAL CONNECTION
|
|||
|
|
|||
|
|
|||
|
1. TYMUSA Gateway Host Number: 5404
|
|||
|
2. Dialup Node(s): TYM2 Gateway Node(s): 222
|
|||
|
3. Rates: $11.40/Hour $0.30/Kilocharacter
|
|||
|
4. Dialup Locations and Numbers:
|
|||
|
|
|||
|
City V.21/300bps V.22/1200bps V.22 1200/2400bps
|
|||
|
-------- ----------- ------------ ---------------
|
|||
|
Akita 0188-65-5735 0188-65-5733
|
|||
|
Atsugi 0462-21-5331 0462-21-0404
|
|||
|
Chiba 0472-27-0671 0472-27-0601
|
|||
|
Fukui 0776-34-3308 0776-35-8840
|
|||
|
Fukuoka 092-474-7076 092-474-7196
|
|||
|
Hamamatsu 0534-56-7355 0534-56-7231
|
|||
|
Hiroshima 082-241-6857 082-243-9270
|
|||
|
Kagoshima 0992-22-8598 0992-22-8954
|
|||
|
Kanazawa 0762-24-2351 0762-24-2341
|
|||
|
Kobe 078-242-1097 078-242-1115
|
|||
|
Kouriyama 0249-38-5396
|
|||
|
Kumamoto 096-355-5233 096-354-3065
|
|||
|
Kyoto 075-431-6205 075-431-6203
|
|||
|
Matsuyama 0899-32-2975 0899-32-4207
|
|||
|
Mito 0292-24-1675 0292-24-4213
|
|||
|
Morioka 0196-54-8513 0196-54-7315
|
|||
|
Nagasaki 0958-28-6088 0958-28-6077
|
|||
|
Nagoya 052-911-1621 052-981-3221
|
|||
|
Naha 0988-61-4002 0988-61-3414
|
|||
|
Niigata 025-241-5409 025-241-5410
|
|||
|
Nogano 0262-34-3900
|
|||
|
Ohita 0975-38-2160
|
|||
|
Okayama 0862-32-6760 0862-31-4993
|
|||
|
Osaka 06-271-9028 06-271-9029 06-271-6876
|
|||
|
Sendai 022-231-5741 022-231-5355
|
|||
|
Sapporo 022-231-5741 022-231-5355
|
|||
|
Shizuoka 0542-84-3393 0542-84-3398
|
|||
|
Takamatsu 0878-23-0502 0878-23-0501
|
|||
|
Takasaki 0273-23-9739
|
|||
|
Tokuyama 0834-32-0991
|
|||
|
Tokyo 03-555-9525 03-555-9526 03-555-9696
|
|||
|
Toyama 0764-41-7578 0764-41-7769
|
|||
|
Tsuchiura 0298-55-6123 0298-55-6121
|
|||
|
Tuchiura 0298-55-5082 0298-55-6121
|
|||
|
Urawa 048-833-9341
|
|||
|
Utsunomiya 0286-34-8251
|
|||
|
Yokohama 045-453-7757 045-453-7637
|
|||
|
Yonago 0859-32-3201
|
|||
|
|
|||
|
5. Trouble Reporting Center:
|
|||
|
Support (local)
|
|||
|
Phone: (011.81.3)-551-6220
|
|||
|
Hours of Operation: 24hrs/day, 7days/week.
|
|||
|
Contact: Network Control Center
|
|||
|
|
|||
|
6. Comments:
|
|||
|
Domestic Username has to be valid with access from Class
|
|||
|
17.
|
|||
|
|
|||
|
|
|||
|
JAPAN - BASIC GLOBAL CONNECTION SERVICE
|
|||
|
|
|||
|
|
|||
|
SERVICE OFFERINGS: 4406/NISnet (National & International)
|
|||
|
|
|||
|
Network Information Service Co. (Tymnet Japan) Net. Name: NISNET
|
|||
|
Marketing and Sales Division DNIC: 4406
|
|||
|
1-13-5 Kudanshita Chiyoda-Ku
|
|||
|
Tokyo, Japan 102
|
|||
|
|
|||
|
Contact: Mr. Toshi Murakami Tel :(81.3)-262-8711
|
|||
|
Fax :(81.3)-262-8757
|
|||
|
Telex :(781)29720
|
|||
|
Ontyme:NIS.HQ
|
|||
|
|
|||
|
U.S. Contact: Mr. Nobuhiro Takayama Tel: (212)351-5059
|
|||
|
Regional Manager of USA Fax: (212)351-5860
|
|||
|
c/o BT Tymnet, Inc.
|
|||
|
335 Madison Avenue, 11th Floor
|
|||
|
New York, New York 10017
|
|||
|
|
|||
|
1. ACCESS/SPEED: Asynchronous dial-in speeds: 300, 1200, 2400bps
|
|||
|
Asynchronous leased speeds : 300-2400bps, 9600bps
|
|||
|
Synchronous leased speeds : 2400-14400bps
|
|||
|
|
|||
|
2. PROTOCOLS: Async, X.PC, Sync, X.25, RJE, 3270 Bisync, SDLC, CMT & SNA.
|
|||
|
(IBM, HITACHI, FUJITSU dialects supported)
|
|||
|
|
|||
|
3. PRICES: Please reference COMMENTS.
|
|||
|
|
|||
|
Service Lead Times: NUI 3 days; Leased lines 30-45 days
|
|||
|
|
|||
|
4. COMMENTS:
|
|||
|
|
|||
|
I. Service description
|
|||
|
|
|||
|
Service name: Pegasus
|
|||
|
|
|||
|
1) T2 (TYMNET) Gateway Services
|
|||
|
|
|||
|
(NIS) (TYMNET)
|
|||
|
|
|||
|
ASYNC ASYNC
|
|||
|
ASYNC X.25
|
|||
|
X.25 ASYNC
|
|||
|
X.25 X.25
|
|||
|
|
|||
|
3270 BSC Native 3270 BSC Native
|
|||
|
(IBM, HITACHI, FUJITSU) (IBM HOST)
|
|||
|
|
|||
|
3270 XNA/CMT ASYNC
|
|||
|
3270 BSC/CMT ASYNC
|
|||
|
(IBM, HITACHI, FUJITSU)
|
|||
|
ASYNC 3270 BSC/CMT(IBM)
|
|||
|
ASYNC 3270 SNA/CMT(IBM)
|
|||
|
|
|||
|
SDLC SDLC
|
|||
|
|
|||
|
3780 3780
|
|||
|
|
|||
|
** X.PC is available in ASYNC protocol.
|
|||
|
** Public TymDial 9.6 is available at Tokyo.
|
|||
|
** X.25, SDLC, XNA interface is available at Tokyo, Osaka, Nagoya,
|
|||
|
Sappolo, Sendai, Fukui, Okayama, Fukuoka,Toyama and Shizuoka.
|
|||
|
|
|||
|
2) X.75 Gateway Services
|
|||
|
|
|||
|
(NIS) (TYMNET)
|
|||
|
|
|||
|
ASYNC ASYNC
|
|||
|
ASYNC X.25
|
|||
|
X.25 ASYNC
|
|||
|
X.25 X.25
|
|||
|
|
|||
|
3270 BSC/CMT ASYNC
|
|||
|
3270 SNA/CMT ASYNC
|
|||
|
|
|||
|
ASYNC 3270 BSC/CMT
|
|||
|
ASYNC 3270 SNA/CMT
|
|||
|
|
|||
|
3) International Dedicated Connection
|
|||
|
|
|||
|
The IDC service is designed to provide any dedicated interface
|
|||
|
customer with a ceiling on connect time charges across their
|
|||
|
link. The customer will be charged a flat $1,000 or 140,000
|
|||
|
yen connect time charge for each interface which receives
|
|||
|
billing (either U.S. or Japan), plus normal character charges
|
|||
|
(see below). This means that a customer with one interface on each
|
|||
|
network making, host to host calls, will pay one IDC charge.
|
|||
|
Two interfaces receiving IDC traffic will be assess one IDC fixed
|
|||
|
charge for each interface. This is an ideal service where PVC's
|
|||
|
are required, for back-up service to an international leased line,
|
|||
|
or any dedicated application that uses more than 85 to 90
|
|||
|
hours per month. A separate order must be entered in
|
|||
|
OES to obtain this facility (see file, NIS.DOC).
|
|||
|
|
|||
|
4) TYMUSA Service: Yes
|
|||
|
|
|||
|
II. Pricing.
|
|||
|
|
|||
|
|
|||
|
NIS INTERNATIONAL RATE SCHEDULE
|
|||
|
-------------------------------
|
|||
|
|
|||
|
Rates are classified into Dedicated port services and Public(Dial-up)
|
|||
|
services. (Note 1$ U.S. = 150.53 Yen as of 7/90).
|
|||
|
|
|||
|
|
|||
|
1. Dedicated line services
|
|||
|
|
|||
|
Monthly rate
|
|||
|
|
|||
|
1) General accounting charge 25,000 yen
|
|||
|
|
|||
|
This charge applies to all leased line customers.
|
|||
|
|
|||
|
(Note) Current users that already use NIS domestic service
|
|||
|
will be charged 5,000 yen only, in addition to domestic
|
|||
|
General accounting rate.
|
|||
|
|
|||
|
2) Dedicated port charge 8,000 yen
|
|||
|
|
|||
|
This charge applies to all dedicated interfaces.
|
|||
|
|
|||
|
3) Each NUI 500 yen
|
|||
|
|
|||
|
4) Enhanced service charge 15,000 yen
|
|||
|
|
|||
|
This charge applies to customers using BSC or SDLC.
|
|||
|
|
|||
|
5) International Dedicated Connection (P.V.C.)
|
|||
|
|
|||
|
140,000 yen or $1,000 per month.
|
|||
|
This eliminates all connect charges.
|
|||
|
IDC is charged on a per interface basis,
|
|||
|
$1,000 for all connect charges across a
|
|||
|
link (see description above).
|
|||
|
|
|||
|
6) Leased line charge including a pair of modems.
|
|||
|
|
|||
|
(yen per month)
|
|||
|
I--------------------------------------------------------I
|
|||
|
I -10 km -20km -30km -60km -120km I
|
|||
|
I--------------------------------------------------------I
|
|||
|
I 2400bps line 28,000 43,000 74,000 102,000 156,000 I
|
|||
|
I 4800bps line 32,000 47,000 78,000 106,000 160,000 I
|
|||
|
I 9600bps line 44,000 59,000 90,000 118,000 172,000 I
|
|||
|
I19200bps line 97,000 112,000 143,000 171,000 225,000 I
|
|||
|
I--------------------------------------------------------I
|
|||
|
|
|||
|
Installation fee(one time) 212,000 each line
|
|||
|
30,000 each modem
|
|||
|
|
|||
|
7) Dedicated Outdial and TymDial 9.6 facility.
|
|||
|
|
|||
|
Installation 10,000 yen
|
|||
|
Dedicated port charge 8,000 yen
|
|||
|
Business Line Charges at cost
|
|||
|
|
|||
|
8) CPE (Customer Premise Equipment) Purchase Price
|
|||
|
|
|||
|
ATC-4 478,000 yen
|
|||
|
ATC-8 584,000 yen
|
|||
|
Pico-Engine 1,498,000 yen
|
|||
|
Micro-Engine 2 512kb 2,652,000 yen
|
|||
|
Micro-Engine 3 1024kb 3,536,000 yen
|
|||
|
Micro-Engine 4 1024kb 3,536,000 yen
|
|||
|
|
|||
|
9) CPE Rental Price
|
|||
|
|
|||
|
ATC-4 25,000 yen/month 100,000 yen/install
|
|||
|
ATC-8 30,000 yen/month 100,000 yen/install
|
|||
|
Pico* 60,000 yen/month 250,000 yen/install
|
|||
|
Micro-2* 90,000 yen/month 250,000 yen/install
|
|||
|
Micro-3* 115,000 yen/month 250,000 yen/install
|
|||
|
Micro-4* 115,000 yen/month 250,000 yen/install
|
|||
|
|
|||
|
* Pico and Micro Price include node code and one
|
|||
|
interface code. Price for additional interface code
|
|||
|
is 25,000 yen/interface/month and 250,000 yen/interface/
|
|||
|
install.
|
|||
|
|
|||
|
2. Public (Dial-up) Service.*
|
|||
|
|
|||
|
1) General accounting charge None
|
|||
|
|
|||
|
2) Each NUI 500 yen
|
|||
|
|
|||
|
*Available speeds are 300-2400bps, and 9600bps.
|
|||
|
There is no communication surcharge for 9600bps
|
|||
|
public dialup.
|
|||
|
|
|||
|
3. Communication charge
|
|||
|
|
|||
|
1) Caller paid
|
|||
|
|
|||
|
1.1 Connect charge 1,920 yen/hour
|
|||
|
IDC Customers do not pay connect charges.
|
|||
|
|
|||
|
1.2 Character transmission charge 45 yen/K-char
|
|||
|
Note step level discounts below.
|
|||
|
|
|||
|
2) Reverse Charge
|
|||
|
2.1. Connect charge $11.40/hour
|
|||
|
2.2. Character transmission charge $ .30/K-char
|
|||
|
|
|||
|
3) Step Level (Volume) discounts for transmission
|
|||
|
|
|||
|
first 10,000 K-char $ .30 or 45 yen per K-char
|
|||
|
next 40,000 K-char $ .14 or 21 yen per K-char
|
|||
|
next 100,000 K-char $ .12 or 18 yen per K-char
|
|||
|
over 150,000 K-char $ .10 or 15 yen per K-char
|
|||
|
|
|||
|
|
|||
|
NIS Domestic Rates Schedule Last update: October 4, 1990
|
|||
|
---------------------------------------------------------
|
|||
|
|
|||
|
These rates apply to domestic customers only.
|
|||
|
|
|||
|
1. Subscription Charge (one time charge)
|
|||
|
1. Dial up (Dedicated) Service 100,000 yen/each line
|
|||
|
2. Leased line service 140,000 yen/each line
|
|||
|
|
|||
|
2. General Charge
|
|||
|
|
|||
|
1. Common to all type of service
|
|||
|
Customer Account charge 20,000 yen/month
|
|||
|
Each user name 500 yen/month
|
|||
|
|
|||
|
2. Dial-up(dedicated) and leased line service only
|
|||
|
Dedicated port charge 8,000 yen/month
|
|||
|
(Modem and line surcharge-- conform to the NIS specifics)
|
|||
|
|
|||
|
3. Communication Charge
|
|||
|
|
|||
|
1. Access Charge Dial-up (public) service only.
|
|||
|
300,1200bps 300 yen/hour
|
|||
|
2400bps 450 yen/hour
|
|||
|
|
|||
|
2. Character transmission Charge
|
|||
|
|
|||
|
I--------------------------------------------------------------I
|
|||
|
I Kilo byte per month peak time off peak time I
|
|||
|
I--------------------------------------------------------------I
|
|||
|
I First 25,000 Kbyte 6.0 yen/Kbyte 2.0 yen/Kbyte I
|
|||
|
I I
|
|||
|
I Next 125,000 Kbyte 4.5 yen/Kbyte 2.0 yen/Kbyte I
|
|||
|
I I
|
|||
|
I Over 150,000 Kbyte 3.0 yen/Kbyte 2.0 yen/Kbyte I
|
|||
|
I--------------------------------------------------------------I
|
|||
|
peak time --from 8 a.m. to 8 p.m.
|
|||
|
|
|||
|
|
|||
|
Installation
|
|||
|
Each modem 30,000 yen
|
|||
|
Upgrade, Downgrade, Move-- priced at the rate NIS specifies
|
|||
|
|
|||
|
|
|||
|
MODEM AND LEASED LINE SURCHARGE RATES
|
|||
|
|
|||
|
1. Dial-up (Dedicated) service only
|
|||
|
|
|||
|
each 300bps modem 5,000 yen/month
|
|||
|
each 1200bps modem 6,500 yen/month
|
|||
|
each 2400bps modem 7,500 yen/month
|
|||
|
|
|||
|
2. Leased line service only
|
|||
|
|
|||
|
I------------------------------------------------------------------I
|
|||
|
I line speed -10km -20km -30km -60km -120km I
|
|||
|
I -----------------------------------------------------------------I
|
|||
|
I 2400 bps line 28,000 43,000 74,000 102,000 156,000 I
|
|||
|
I 4800 bps line 32,000 47,000 78,000 106,000 160,000 I
|
|||
|
I 9600 bps line 44,000 59,000 90,000 118,000 172,000 I
|
|||
|
J1f0?s X%997,000 112,000 143,000 171,000 225,000 I
|
|||
|
I------------------------------------------------------------------I
|
|||
|
(yen per month)
|
|||
|
|
|||
|
|
|||
|
------------------ OPERATIONAL/TECHNICAL INFORMATION ---------------------
|
|||
|
|
|||
|
1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
|
|||
|
Contact: Network Control Center
|
|||
|
Hours of Operation: 24hrs/day, 7days/week.
|
|||
|
Phone: (81.3)-551-6220
|
|||
|
Fax : (81.3)-551-6355
|
|||
|
Ontyme: NIS.NETCON
|
|||
|
NIS.TC
|
|||
|
|
|||
|
2. NETWORK INFORMATION ADDRESS: n/a
|
|||
|
|
|||
|
3. TEST ADDRESS:
|
|||
|
|
|||
|
Drop Terminal: 440620000840
|
|||
|
Echo Host: 44062000089901
|
|||
|
|
|||
|
4. ASYNC ACCESS PROCEDURE:
|
|||
|
|
|||
|
LOGON:
|
|||
|
|
|||
|
TYMNET STYLE "please log in: "
|
|||
|
|
|||
|
5. TYMUSA Available: Yes, see note IBAND: n/a, see note
|
|||
|
|
|||
|
Note: IBAND does not apply as network server is not used
|
|||
|
|
|||
|
6. DEFAULT PAD SETTINGS:
|
|||
|
|
|||
|
7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS:
|
|||
|
|
|||
|
City V.21/300bps V.22/1200bps V.22 1200/2400bps
|
|||
|
----------- ----------- ------------ -----------------
|
|||
|
Akita 0188-65-5735 0188-65-5733
|
|||
|
Atsugi 0462-21-5331 0462-21-0404
|
|||
|
Chiba 0472-27-0671 0472-27-0601
|
|||
|
Fukui 0776-34-3308 0776-35-8840
|
|||
|
Fukuoka 092-474-7076 092-474-7196
|
|||
|
Hamamatsu 0534-56-7355 0534-56-7231
|
|||
|
Hiroshima 082-241-6857 082-243-9270
|
|||
|
Kagoshima 0992-22-8598 0992-22-8954
|
|||
|
Kanazawa 0762-24-2351 0762-24-2341
|
|||
|
Kobe 078-242-1097 078-242-1115
|
|||
|
Kouriyama 0249-38-5396
|
|||
|
Kumamoto 096-355-5233 096-354-3065
|
|||
|
Kyoto 075-431-6205 075-431-6203
|
|||
|
Matsuyama 0899-32-2975 0899-32-4207
|
|||
|
Mito 0292-24-1675 0292-24-4213
|
|||
|
Morioka 0196-54-8513 0196-54-7315
|
|||
|
Nagasaki 0958-28-6088 0958-28-6077
|
|||
|
Nagoya 052-911-1621 052-981-3221
|
|||
|
Naha (Okinawa) 0988-61-4002 0988-61-3414
|
|||
|
Nogano 0262-34-3900
|
|||
|
Ohita 0975-38-2160
|
|||
|
Okayama 0862-32-6760 0862-31-4993
|
|||
|
Osaka 06-271-9028 06-271-9029 06-271-6876
|
|||
|
Sapporo 011-281-4343 011-281-4421
|
|||
|
Sendai 022-231-5741 022-231-5355
|
|||
|
Shizuoka 0542-84-3393 0542-84-3398
|
|||
|
Takamatsu 0878-23-0502 0878-23-0501
|
|||
|
Takasaki 0273-23-9739
|
|||
|
Tokuyama 0834-32-0991
|
|||
|
Tokyo 03-555-9525 03-555-9526 03-555-9696
|
|||
|
Toyama 0764-41-7578 0764-41-7769
|
|||
|
Tsuchiura 0298-55-6123 0298-55-6121
|
|||
|
Urawa 048-833-9341
|
|||
|
Utsunomiya 0286-34-8251
|
|||
|
Yokohama 045-453-7757 045-453-7637
|
|||
|
Yonago 0859-32-3201
|
|||
|
|
|||
|
|
|||
|
Note: For NISNET-Tymnet IVAN Installation & Implementation guide,
|
|||
|
please reference (INTLINFO:38)IIGUD.NIS
|
|||
|
|
|||
|
For NISNET-Tymnet IVAN Service trouble report, please reference
|
|||
|
(INTLINFO:38)TBLPRO.NIS
|
|||
|
|
|||
|
For detailed NIS business & operation information, please
|
|||
|
reference (INTLINFO:38)NIS.DOC
|
|||
|
|
|||
|
========================
|
|||
|
|
|||
|
Kokusai Denshin Denwa Co. Ltd(KDD) Net. Name: VENUS-P
|
|||
|
NUI Marketing & Customer Service DNIC: 4408
|
|||
|
2-2-2, Marunochi, Chi-Yoda-Ku
|
|||
|
Tokyo 100, Japan
|
|||
|
Contact: Mr Kohichi Ukegawa Tel : (81)3-347-5871
|
|||
|
Telex : (781)22500
|
|||
|
Ontyme: INTL.KDDMKTG
|
|||
|
|
|||
|
Washington Liaison Office:
|
|||
|
|
|||
|
Kokusai Denshin Denwa Company, Ltd. (KDD)
|
|||
|
34K, Intelsat Building
|
|||
|
3400 International Drive., NW
|
|||
|
Washington, D.C. 20008-3098
|
|||
|
Tel : (202)944-7900
|
|||
|
Telex : 440205 KDD UI
|
|||
|
Fax : (202)362-4365
|
|||
|
Ontyme: INTL.KDD/DC
|
|||
|
|
|||
|
New York Liaison Office:
|
|||
|
|
|||
|
Kokusai Denshin Denwa Company, Ltd. (KDD)
|
|||
|
535 Madison Avenue 33rd Floor
|
|||
|
New York, NY 10022
|
|||
|
Contact: Mr Toshiki Ueda Tel : (212)832-3550
|
|||
|
|
|||
|
|
|||
|
1. ACCESS/SPEEDS: Asynchronous dial-in speeds: 110-300, 1200bps
|
|||
|
Asynchronous leased speeds: 110-300, 1200bps
|
|||
|
Synchronous Leased speeds: 2400, 4800, 9600bps
|
|||
|
|
|||
|
2. PROTOCOLS: X.25, Bisync, HDLC, Asynchronous terminal interface
|
|||
|
|
|||
|
3. PRICES: ALL Prices are in Japanese Yen
|
|||
|
(1$ US = 130.20 yen 7/88)
|
|||
|
|
|||
|
1: Communication Charges
|
|||
|
Connect Time: Yen 40/minute
|
|||
|
Transmission: Yen 2.4/segment
|
|||
|
|
|||
|
A. Installation charges (one time)
|
|||
|
(for tie line contract)
|
|||
|
Leased Line Installation Yen 72,000. for 300 bps
|
|||
|
Yen 102,000. for 1200-9600
|
|||
|
|
|||
|
DCE/Additional Service
|
|||
|
Installation: At cost
|
|||
|
|
|||
|
B. Monthly Basic Charge
|
|||
|
1. Tie Line Contract: Yen 21,400. for 300 bps
|
|||
|
Yen 28,200. for 1200 bps
|
|||
|
Yen 48,000. for 2400 bps
|
|||
|
Yen 75,000. for 4800 bps
|
|||
|
Yen 114,000. for 9600 bps
|
|||
|
|
|||
|
Additional Net. Name:
|
|||
|
Multiple Logical Channel:
|
|||
|
Yen 90. per logical chnl.
|
|||
|
Abbreviated Dialing: Yen 1,080 for synchronous
|
|||
|
Yen 270. for asynchronous
|
|||
|
Yen 620. per line
|
|||
|
|
|||
|
2. Dial-up Contract: Yen 270. per NUI per month
|
|||
|
(abbreviated dialing)
|
|||
|
|
|||
|
4. COMMENTS: KDD's Liaison offices in New York & Washington are very
|
|||
|
helpful for any prospect.
|
|||
|
|
|||
|
|
|||
|
------------------ OPERATIONAL/TECHNICAL INFORMATION -------------------------
|
|||
|
|
|||
|
1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
|
|||
|
Contact: KDD IDSC Tokyo (Network Control Center)
|
|||
|
Hours of Operation: 24hrs/365 days
|
|||
|
Phone: (81)3-347-5221
|
|||
|
Telex: (781)26600
|
|||
|
Ontyme: INTL.KDDOPNS
|
|||
|
|
|||
|
2. NETWORK INFORMATION ADDRESS: n/a
|
|||
|
|
|||
|
3. TEST ADDRESS: 44082006001
|
|||
|
|
|||
|
4. ASYNC ACCESS PROCEDURES:
|
|||
|
|
|||
|
LOGON:
|
|||
|
|
|||
|
1. On modem connect.
|
|||
|
|
|||
|
2. PAD prompt: .P=FA (FA is profile ID)
|
|||
|
|
|||
|
3. Login string: N<nui&password>-3106xxxxxx[Dcud]<cr>
|
|||
|
^ ^
|
|||
|
optional CUD ___|____|
|
|||
|
|
|||
|
5. TYMUSA AVAILABLE: Yes
|
|||
|
|
|||
|
6. DEFAULT PAD SETTINGS:
|
|||
|
|
|||
|
1:1, 2:1, 3:126, 4:0, 5:1, 6:1, 7:2, 8:0, 9:0, 10:0, 12:1,
|
|||
|
13:0, 14:0, 15:0, 16:8, 17:24, 18:0, 19:1, 20:0, 21:0, 22:0
|
|||
|
|
|||
|
7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS:
|
|||
|
|
|||
|
300bps(V.21) 1200bps(V.22) 2400bps(V.22bis)
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Tokyo (81.3)-345-0300 343-1200 344-2400
|
|||
|
|
|||
|
Osaka (81.6)-944-0300 942-1211 944-2400
|
|||
|
|
|||
|
Note: These are toll free numbers that can not be accessed via IDDD.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- KUWAIT ---
|
|||
|
|
|||
|
KUWAIT - BASIC GLOBAL CONNECTION SERVICE
|
|||
|
|
|||
|
|
|||
|
Ministry of Communications, KUPAC Section
|
|||
|
Kuwait
|
|||
|
|
|||
|
Contact, Engineering: Tel: 965-2408906
|
|||
|
|
|||
|
|
|||
|
1. ACCESS/SPEEDS:
|
|||
|
|
|||
|
2. PROTOCOLS:
|
|||
|
|
|||
|
3. PRICES: All prices are in Kuwaiti Dinars (KD)
|
|||
|
(1$ US = .29 KD 7/90)
|
|||
|
|
|||
|
A. Fixed Charges:
|
|||
|
|
|||
|
Speed Dial-up Access Leased Line Access
|
|||
|
--------------------------------------------------------
|
|||
|
300-2400 bps 150 KD 200 KD
|
|||
|
4800 bps N/A 250 KD
|
|||
|
9600 bps N/A 300 KD
|
|||
|
|
|||
|
B. International Connection Charges:
|
|||
|
|
|||
|
0.050 KD /min all countries
|
|||
|
0.005 KD/segment all countries
|
|||
|
|
|||
|
C. Local Connection Charges:
|
|||
|
|
|||
|
0.010 KD/minute
|
|||
|
0.003 KD/segment
|
|||
|
|
|||
|
|
|||
|
4. COMMENTS: Service is also provided via Bahrain.
|
|||
|
|
|||
|
|
|||
|
------------------OPERATIONAL/TECHNICAL INFORMATION---------------
|
|||
|
|
|||
|
1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
|
|||
|
Contact: KUPAC Control
|
|||
|
Hours of Operation: 0400 - 1000 GMT
|
|||
|
Phone: 965-2408902/3/4
|
|||
|
Telex: 496-30828
|
|||
|
Fax: 965-2408907
|
|||
|
|
|||
|
2. SERVICE INFORMATION ADDRESS: n/a
|
|||
|
|
|||
|
3. TEST ADDRESS: Contact Customer Service for Test Address
|
|||
|
|
|||
|
4. ASYNC ACCESS PROCEDURES:
|
|||
|
|
|||
|
5. TYMUSA AVAILABLE: No
|
|||
|
|
|||
|
6. DEFAULT PAD SETTINGS:
|
|||
|
1:1, 2:1, 3:126, 4:20, 5:2, 6:13, 7:2, 8:0, 9:0, 10:0, 12:1, 13:1,
|
|||
|
14:0, 15:1, 16:127, 17:24, 18:18, 19:1, 20:0, 21:0, 22:0, 80:4, 81:88)
|
|||
|
|
|||
|
7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS:
|
|||
|
|
|||
|
NATIONWIDE ACCESS:
|
|||
|
|
|||
|
Modem Speed Access Phone Number
|
|||
|
--------------------------------------------
|
|||
|
300 bps 143
|
|||
|
1200 bps 142
|
|||
|
2400 bps 141
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- LUXEMBOURG ---
|
|||
|
|
|||
|
LUXEMBOURG - BASIC GLOBAL CONNECTION SERVICE
|
|||
|
|
|||
|
|
|||
|
Administration des P. et T. Net. Name: LUXPAC
|
|||
|
Division des Telecommunications DNIC: 2704
|
|||
|
Bureau 211
|
|||
|
5, rue de Hollerich
|
|||
|
L-2999 Luxembourg
|
|||
|
Contact: Mr. M. Barnig, Mr. P. Ney Tel. (352) 4991-710
|
|||
|
(for information about Luxpac) Telex: (848)3410 ptdt lu
|
|||
|
|
|||
|
Mr. Gilbert Hoscheid Tel. (352) 4991-722
|
|||
|
(for subscription and tariffs) Fax (352) 493049
|
|||
|
Telex: (402) 60520
|
|||
|
OnTyme: INTL.LUXMKTG
|
|||
|
|
|||
|
Mr. Paul Ney Tel: (352) 4991 732
|
|||
|
(engineering/technical) Fax: (352)491221
|
|||
|
Telex: (402) 3410
|
|||
|
|
|||
|
Network Supervision and Maint. Tel: (352) 4991 742
|
|||
|
Fax: (352) 489324
|
|||
|
|
|||
|
1. ACCESS/SPEEDS: Asynchronous dial-in speeds: 300, 1200, 1200/75,
|
|||
|
2400 bps
|
|||
|
Asynchronous leased speeds: 300, 1200, 1200/75,
|
|||
|
2400 bps
|
|||
|
Synchronous leased speeds: 2400, 4800, 9600,
|
|||
|
19200, 48000, 64000 bps
|
|||
|
|
|||
|
2. PROTOCOLS: X.25, X.28, X.32
|
|||
|
|
|||
|
3. PRICES: All prices are in Luxembourg Francs (LF)
|
|||
|
|
|||
|
- Usage Charges for Traffic to the USA
|
|||
|
(for both types of access: direct or via PSTN)
|
|||
|
|
|||
|
Call set-up charge LF 0.25/call
|
|||
|
Connect Time LF 4.00/minute
|
|||
|
Transmission LF 0.20/segment
|
|||
|
|
|||
|
- Direct Access
|
|||
|
|
|||
|
a) Installation Charges
|
|||
|
|
|||
|
for X.28 direct connection LF 5 000,00
|
|||
|
for X.25 direct connection LF 75 000,00
|
|||
|
|
|||
|
b) Monthly Charges for leased lines connection
|
|||
|
(includes one modem at customer's site and
|
|||
|
one logical channel for X.25 connection)
|
|||
|
|
|||
|
110-300 bps X.28 LF 1 500.00
|
|||
|
1200/75 bps X.28 LF 2 000.00
|
|||
|
1200 bps X.28 LF 3 000.00
|
|||
|
2400 bps X.28 LF 4 500.00
|
|||
|
2400 bps X.25 LF 5 000.00
|
|||
|
4800 bps X.25 LF 7 500.00
|
|||
|
9600 bps X.25 LF 10 000.00
|
|||
|
19200 bps X.25 LF 17 500.00
|
|||
|
48000 bps X.25 LF 30 000.00
|
|||
|
64000 bps X.25 LF 35 000.00
|
|||
|
|
|||
|
c) Other Charges
|
|||
|
|
|||
|
Additional logical channel:
|
|||
|
. Installation LF 500.00
|
|||
|
. Monthly charge LF 100.00
|
|||
|
. Access to Teletex
|
|||
|
conversion unit LF 1 000.00
|
|||
|
|
|||
|
NUI:
|
|||
|
. One-time charge LF 500.00
|
|||
|
. Monthly charge LF 250.00
|
|||
|
|
|||
|
- Dial-Up Access X.28 and X.32
|
|||
|
|
|||
|
a) Installation Charges:
|
|||
|
|
|||
|
NUI LF 1 000.00
|
|||
|
|
|||
|
b) Monthly Charges X.28:
|
|||
|
|
|||
|
NUI LF 100.00
|
|||
|
300 bps LF 200.00
|
|||
|
1200 bps LF 1 200.00
|
|||
|
2400 bps LF 2 000.00
|
|||
|
|
|||
|
c) Monthly Charges X.32:
|
|||
|
|
|||
|
NUI LF 100.00
|
|||
|
2400 bps LF 3 000.00
|
|||
|
|
|||
|
4. COMMENTS:
|
|||
|
|
|||
|
--------------------- OPERATIONAL/TECHNICAL INFORMATION -------------------
|
|||
|
|
|||
|
1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
|
|||
|
Hours of Operation: 24 Hours a day, 7 days a week
|
|||
|
Phone: 17
|
|||
|
Telex: (402) 60745
|
|||
|
Fax: (352) 492617
|
|||
|
2. SERVICE INFORMATION ADDRESS: n/a
|
|||
|
|
|||
|
3. TEST ADDRESS: 027044800000, 027044900000 Echo NUA
|
|||
|
027044800001, 027044900001 Drop NUA
|
|||
|
|
|||
|
4. ASYNC ACCESS PROCEDURES:
|
|||
|
|
|||
|
1. On modem connect, LUXPAC replies xxx yyy zzz
|
|||
|
(xxx yyy zzz is the port and node number)
|
|||
|
|
|||
|
2. Type N followed by your LUXPAC NUI, and by the called
|
|||
|
NUA, separated by '-' :
|
|||
|
N<nui>-0<nua>(cr)
|
|||
|
or +
|
|||
|
|
|||
|
3. LUXPAC will reply: COM
|
|||
|
|
|||
|
5. TYMUSA AVAILABLE: No
|
|||
|
|
|||
|
6. DEFAULT PAD SETTINGS:
|
|||
|
1:0, 2:1, 3:126, 4:0, 5:1, 6:1, 7:2, 8:0, 9:0, 10:0,
|
|||
|
11:not defined, 12:1, 13:0, 14:0, 15:0, 16:8, 17:24, 18:42
|
|||
|
|
|||
|
7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS: (National wide)
|
|||
|
|
|||
|
Modem/Speed Access Number
|
|||
|
----------------------------------------------------------
|
|||
|
X.28 100-300 bps/V21 0731
|
|||
|
300 bps/V21 0733
|
|||
|
1200/75 bps/V23 0734
|
|||
|
1200 bps/V22 0735
|
|||
|
2400 bps/V22bis 0736
|
|||
|
|
|||
|
X.32 2400 bps/V22bis 0732
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- MALAYSIA ---
|
|||
|
|
|||
|
MALAYSIA - BASIC GLOBAL CONNECTION SERVICE
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Syarikat Telecom Malaysia Berhad (STM)
|
|||
|
STM Headquarters
|
|||
|
Jalan Raja Chulan
|
|||
|
50200 Kula Lumpur
|
|||
|
Malaysia
|
|||
|
|
|||
|
Contact: Ms. Rafiah Ibrahim PH: 03-2329494
|
|||
|
Telex: MA 90196 NCCPJ
|
|||
|
|
|||
|
1. ACCESS/SPEEDS: Asynchronous 300, 1200 bps
|
|||
|
Synchronous 2400, 4800, 9600 bps
|
|||
|
|
|||
|
2. PROTOCOLS:
|
|||
|
|
|||
|
3. PRICES: All prices are in Malaysian Ringgit's (MR).
|
|||
|
(1$ US = 2.70 MR 10/90)
|
|||
|
|
|||
|
Usage Charge
|
|||
|
Connect Time: $0.45 per minute or part thereof
|
|||
|
Transmission: $0.25 per 10 segments or part thereof
|
|||
|
|
|||
|
(For dial-up subscribers calls to the MAYPAC exchange will
|
|||
|
be charged in the telephone bill).
|
|||
|
|
|||
|
SPEED LINE RENTAL/MO. PORT RENTAL/MO.
|
|||
|
|
|||
|
300 MR 35.00 MR 135.00
|
|||
|
1200 MR 35.00 MR 210.00
|
|||
|
2400 MR 70.00 MR 320.00
|
|||
|
4800 MR 70.00 MR 585.00
|
|||
|
9600 MR 70.00 MR 720.00
|
|||
|
|
|||
|
Installation:
|
|||
|
|
|||
|
Deposit. . . . . . . . . . $500.00
|
|||
|
|
|||
|
Connection Fee:
|
|||
|
300 bps . . . . . . . . . $600.00
|
|||
|
1200 bps . . . . . . . . . $850.00
|
|||
|
2400 bps . . . . . . . . $1,300.00
|
|||
|
4800 bps . . . . . . . . $ 850.00
|
|||
|
9600 bps . . . . . . . . $ 850.00
|
|||
|
|
|||
|
Speed of Line Rental Port Rental NUI
|
|||
|
Modem per month per month per mo.
|
|||
|
|
|||
|
Dial-In Access 300 bps Normal Telephone $65.00 $10.00
|
|||
|
1200 bps rental applies $105.00 $10.00
|
|||
|
|
|||
|
4. COMMENTS: For leased line connections, modems are included in the rental
|
|||
|
of lines.
|
|||
|
|
|||
|
-----------------------OPERATIONAL/TECHNICAL INFORMATION-------------------
|
|||
|
|
|||
|
1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
|
|||
|
|
|||
|
2. SERVICE INFORMATION ADDRESS: 50211320025600
|
|||
|
|
|||
|
3. TEST ADDRESS: 50211320014510 Echo Host
|
|||
|
50211320014211 Drop Terminal
|
|||
|
|
|||
|
4. ASYNC ACCESS PROCEDURES:
|
|||
|
Upon modem connect . . .
|
|||
|
|
|||
|
Send: <CR> <CR>
|
|||
|
Receive: Maypac
|
|||
|
Terminal =
|
|||
|
Send: <CR>
|
|||
|
Receive: User ID =
|
|||
|
Send: User ID (Issued by Maypac)
|
|||
|
Receive: Password =
|
|||
|
Send: Password (Issued by Maypac)
|
|||
|
Receive: Destination =
|
|||
|
Send: Network user address (NUA) of intended destination
|
|||
|
Receive: Connection message
|
|||
|
|
|||
|
5. TYMUSA AVAILABLE: No
|
|||
|
|
|||
|
6. DEFAULT PAD SETTINGS: (X.3 Profile)
|
|||
|
|
|||
|
1:64, 2:1, 3:2, 4:20, 5:0, 6:5, 7:2, 8:0, 9:7, 10:0, 11:X read only par.,
|
|||
|
12:0, 13:4, 14:7, 15:0, 16:8, 17:24, 18:18
|
|||
|
|
|||
|
NOTE: The value "X" of parameter no. 11 (speed of the X.28 DTE) is set
|
|||
|
by the PAD when the physical circuit is established when a carriage
|
|||
|
return is entered at the "terminal =" by the user during the
|
|||
|
logon procedure. At the "terminal =" prompt the user may also
|
|||
|
enter the ID of the standard profile (from an ID list) most suitable
|
|||
|
for the terminal type and application.
|
|||
|
|
|||
|
7. ASYNC DIAL IN ACCESS TELEPHONE NUMBERS:
|
|||
|
|
|||
|
City/Territory Modem/Speed Access Number
|
|||
|
---------------------------------------------------------------------
|
|||
|
Kuala Lumpur/Federal Ter. V.21/300 (6.03) 2328800
|
|||
|
V.22/1200 (6.03) 2328855
|
|||
|
Penang/Pulau Pinang V.21/300 (6.04) 375588
|
|||
|
V.22/1200 (6.04) 360088
|
|||
|
Kota Kinabalu/Sabah V.21/300 (6.088) 218800
|
|||
|
V.22/1200 (6.088) 218855
|
|||
|
Petaling Jaya/Selangor V.21/300 (6.03) 7926600
|
|||
|
V.22/1200 (6.03) 7926655
|
|||
|
Ipoh/Perak V.21/300 (6.05) 548533
|
|||
|
V.22/1200 (6.05) 548444
|
|||
|
Kuantan/Pahang V.21/300 (6.09) 508800
|
|||
|
V.22/1200 (6.09) 508855
|
|||
|
Johore Bharu/Johor V.21/300 (6.07) 248800
|
|||
|
V.22/1200 (6.07) 248855
|
|||
|
Kuching/Sarawak V.21/300 (6.082) 418800
|
|||
|
V.22/1200 (6.082) 418855
|
|||
|
Kota Bharu/Kelantan V.21/300 (6.09) 748800
|
|||
|
V.22/1200 (6.09) 748855
|
|||
|
Malacca/Melaka V.21/300 (6.06) 238800
|
|||
|
V.22/1200 (6.06) 238855
|
|||
|
Alor Star/Kedah V.21/300 (6.04) 715544
|
|||
|
V.22/1200 (6.04) 716644
|
|||
|
Kuala Terengganu/ V.21/300 (6.09) 638800
|
|||
|
Terengganu V.22/1200 (6.09) 638855
|
|||
|
Miri/Sarawak V.21/300 (6.085) 410011
|
|||
|
V.22/1200 (6.085) 410055
|
|||
|
Sandakan/Sabah V.21/300 (6.089) 273300
|
|||
|
V.22/1200 (6.089) 273355
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- MEXICO ---
|
|||
|
|
|||
|
MEXICO - BASIC GLOBAL CONNECTION SERVICE
|
|||
|
|
|||
|
|
|||
|
(-4h GMT) Last Update: October 15, 1990
|
|||
|
|
|||
|
Secretaria de Comunicaciones y Transportes Net. Name: TELEPAC
|
|||
|
Eje Lazaro Cardenas No. 567 DNIC: 3340
|
|||
|
03020 Mexico, D.F. Mexico
|
|||
|
Contact: Jesus A. Ramirez Cordero (52.5) 530-2099
|
|||
|
Telex: (383) 170932
|
|||
|
OnTyme: INTL.SCTMKTG
|
|||
|
|
|||
|
1. ACCESS/SPEEDS: Public Dial-in : 110-300, 1200 bps
|
|||
|
Leased line: 2400, 4800, 9600 bps
|
|||
|
|
|||
|
2. PROTOCOLS:
|
|||
|
|
|||
|
3. PRICES: All prices are in U.S. dollars.
|
|||
|
All calls from Mexico should be sent reverse charged
|
|||
|
and billed in the U.S.
|
|||
|
|
|||
|
Subscription Charge: $ 51.62 subscription
|
|||
|
$ 96.33 port usage dedicated
|
|||
|
line
|
|||
|
$ 24.08 port usage non dedicated
|
|||
|
line
|
|||
|
$17.20 rent for ID (NUI,monthly)
|
|||
|
|
|||
|
These charges are one time charges and cover the
|
|||
|
subscription to Telepac. The NUI is a monthly charge.
|
|||
|
|
|||
|
Domestic Usage: $240.00 monthly rent for dedicated
|
|||
|
(Intra Mexico) line
|
|||
|
$ 4.64 per hour
|
|||
|
$ 0.79 per kilosegment
|
|||
|
|
|||
|
Traffic to the US: $ 6.50 per hour
|
|||
|
Transmission: $ 5.00/kilosegment (reverse chg.)
|
|||
|
Telephone Access Charge: None
|
|||
|
|
|||
|
Telepac's customer service number is 905-530-2099.
|
|||
|
Calls to Tymnet from Mexico will be reverse charged
|
|||
|
billed.
|
|||
|
|
|||
|
Tymnet can provide a NUI for access from Mexico. Our
|
|||
|
agent in Mexico is the best source of aid and information
|
|||
|
for communications from Mexico. For detailed information
|
|||
|
regarding the Tymnet NUI and Mexican dial-up access
|
|||
|
locations read ontyme file, "*** INTL.MEXICO", or consult
|
|||
|
your Tymnet Sales Representative.
|
|||
|
|
|||
|
4. COMMENTS:
|
|||
|
Tymnet Agent:
|
|||
|
Ing. Alejandro Acosta (525) 523-9421/543-0524
|
|||
|
Sistemas Ciberneticos, S.A. OnTyme: INTL.MEXICO/SICISA
|
|||
|
Concepcion
|
|||
|
Beistegui No. 109 6 Piso
|
|||
|
Mexico City, Mexico
|
|||
|
|
|||
|
|
|||
|
------------------------OPERATIONAL/TECHNICAL INFORMATION---------------
|
|||
|
|
|||
|
1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
|
|||
|
|
|||
|
2. SERVICE INFORMATION ADDRESS:
|
|||
|
|
|||
|
3. TEST ADDRESS:
|
|||
|
|
|||
|
4. ASYNC ACCESS PROCEDURES:
|
|||
|
|
|||
|
Dial access number, (see list below). Upon modem connect. . .
|
|||
|
|
|||
|
Receive: CONNECT 1200
|
|||
|
TELEPAC
|
|||
|
905 401W
|
|||
|
TERMINAL=
|
|||
|
|
|||
|
Send: <cr>
|
|||
|
|
|||
|
Receive: @
|
|||
|
|
|||
|
Send: "ID<sp><sp>/TYMNET"<cr>
|
|||
|
|
|||
|
Receive: PASSWORD=
|
|||
|
|
|||
|
Send: PASSWORD"030537" (password will not be echoed on screen)
|
|||
|
|
|||
|
Receive: @
|
|||
|
|
|||
|
Send: "C<sp><sp>031069<cr>
|
|||
|
|
|||
|
Receive: 3106 9 CONNECTED
|
|||
|
|
|||
|
tymnet: please log in:
|
|||
|
|
|||
|
Send: "host username;password)"<cr>
|
|||
|
|
|||
|
5. TYMUSA AVAILABLE: No
|
|||
|
|
|||
|
6. DEFAULT PAD SETTINGS:
|
|||
|
|
|||
|
7. PAD PARAMETER LIST
|
|||
|
|
|||
|
8. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS:
|
|||
|
|
|||
|
City/Territory Modem/Speed Access Number
|
|||
|
--------------------------------------------------------------
|
|||
|
ACAPULCO 300 bps (748) 2-33-92 *
|
|||
|
300 bps 2-12-48 *
|
|||
|
3-70-41 %%x
|
|||
|
1200 bps 3-61-17
|
|||
|
1200 bps 3-70-15
|
|||
|
1200 bps 3-70-67 **
|
|||
|
|
|||
|
AGUASCALIENTES 1200 bps (491) 5-12-13 **
|
|||
|
300 bps 5-12-21 *
|
|||
|
300 bps 5-12-76
|
|||
|
2400 bps 5-12-52
|
|||
|
2400 bps 5-16-94
|
|||
|
|
|||
|
COATZACOALCOS 300 bps (921) 2-15-20
|
|||
|
300 bps 2-15-52
|
|||
|
2-15-51
|
|||
|
2-15-19
|
|||
|
2-15-27
|
|||
|
2-14-04
|
|||
|
1200 bps 2-15-18
|
|||
|
1200 bps 2-15-16
|
|||
|
|
|||
|
CUERNAVACA 1200 bps (73) 12-86-02
|
|||
|
300 bps 12-83-03
|
|||
|
1200 bps 12-86-01
|
|||
|
1200 bps 12-86-00
|
|||
|
|
|||
|
CHIHUAHUA 300 bps (14) 16-73-30
|
|||
|
300 bps 16-72-20
|
|||
|
300 bps 16-74-75
|
|||
|
1200 bps 16-75-75
|
|||
|
1200 bps 16-75-95
|
|||
|
1200 bps 16-77-47
|
|||
|
16-79-50
|
|||
|
16-79-00
|
|||
|
16-78-00
|
|||
|
16-77-57
|
|||
|
|
|||
|
DURANGO 1200 bps (181) 1-28-51
|
|||
|
1200 bps 1-28-52
|
|||
|
1-28-58 **
|
|||
|
1200 bps 1-28-60
|
|||
|
300 bps 1-28-61
|
|||
|
300 bps 1-28-76
|
|||
|
1200 bps 1-28-85
|
|||
|
|
|||
|
GUADALAJARA 300 bps (36) 26-55-68
|
|||
|
300 bps 26-56-02
|
|||
|
300 bps 26-55-80
|
|||
|
300 bps 26-55-86
|
|||
|
1200 bps 26-56-25
|
|||
|
1200 bps 26-56-51
|
|||
|
1200 bps 26-56-38
|
|||
|
1200 bps 26-56-67
|
|||
|
1200 bps 26-58-36
|
|||
|
1200 bps 26-57-76
|
|||
|
1200 bps 26-50-64
|
|||
|
1200 bps 26-07-82
|
|||
|
|
|||
|
HERMOSILLO 300 bps (621) 2-30-53
|
|||
|
2-34-57
|
|||
|
2-35-47 **
|
|||
|
2-38-39
|
|||
|
1200 bps 2-39-60
|
|||
|
2-72-10
|
|||
|
2-71-09
|
|||
|
2-74-88 **
|
|||
|
|
|||
|
LEON 300 bps (471) 4-81-89
|
|||
|
4-80-79
|
|||
|
1200 bps 4-86-13
|
|||
|
4-87-60 **
|
|||
|
4-81-82 *
|
|||
|
6-57-51
|
|||
|
6-58-12
|
|||
|
6-58-54
|
|||
|
6-58-56
|
|||
|
6-58-70
|
|||
|
6-58-93
|
|||
|
6-58-16
|
|||
|
6-59-55
|
|||
|
|
|||
|
MAZATLAN (678) 2-03-77 *
|
|||
|
2-09-31 *
|
|||
|
2-04-87 *
|
|||
|
2-05-86 *
|
|||
|
1200 bps 2-01-29
|
|||
|
2-02-77
|
|||
|
|
|||
|
MERIDA (99) 24-41-55
|
|||
|
300 bps 24-42-90
|
|||
|
24-43-89
|
|||
|
24-45-08
|
|||
|
1200 bps 24-41-02
|
|||
|
1200 bps 24-48-19
|
|||
|
1200 bps 24-48-56
|
|||
|
1200 bps 24-44-19
|
|||
|
24-47-89
|
|||
|
24-49-20
|
|||
|
24-46-90
|
|||
|
|
|||
|
MEXICALI (65) 53-63-01 **
|
|||
|
300 bps 53-63-04 **
|
|||
|
1200 bps 53-63-17
|
|||
|
53-63-05
|
|||
|
53-63-06
|
|||
|
53-63-07
|
|||
|
53-63-08
|
|||
|
53-63-09
|
|||
|
|
|||
|
MEXICO CITY 1200 bps (905) 590-8888
|
|||
|
696-6198
|
|||
|
695-6005
|
|||
|
696-6099
|
|||
|
|
|||
|
MONTERREY 1200 bps (83) 55-47-53
|
|||
|
55-48-07
|
|||
|
55-42-27
|
|||
|
55-44-36
|
|||
|
55-61-45
|
|||
|
55-60-93
|
|||
|
55-62-49
|
|||
|
1200 bps 55-61-03
|
|||
|
300 bps 55-45-46
|
|||
|
300 bps 55-46-44
|
|||
|
300 55-46-45
|
|||
|
300 bps 55-41-75
|
|||
|
|
|||
|
OAXACA 1200 bps (951) 6-99-89
|
|||
|
300 bps 6-99-75
|
|||
|
6-99-77
|
|||
|
6-99-91
|
|||
|
1200 bps 6-99-00
|
|||
|
|
|||
|
PUEBLA 1200 bps 22 40-50-11
|
|||
|
40-53-34 *
|
|||
|
300 bps 40-53-00
|
|||
|
1200 bps 40-54-91
|
|||
|
300 bps 40-56-28
|
|||
|
1200 bps 40-50-75
|
|||
|
40-56-38
|
|||
|
|
|||
|
QUERETARO 1200 bps (463) 4-22-23
|
|||
|
4-29-72
|
|||
|
300 bps 4-04-31 **
|
|||
|
4-00-06 **
|
|||
|
1200 bps 4-02-77
|
|||
|
|
|||
|
SALTILLO 1200 bps (841) 4-54-88
|
|||
|
1200 bps 4-55-39
|
|||
|
300 bps 4-56-45 **
|
|||
|
4-53-62 **
|
|||
|
|
|||
|
TAMPICO (12) 15-77-90 *
|
|||
|
15-76-10 **
|
|||
|
15-77-28 **
|
|||
|
1200 bps 15-71-90
|
|||
|
15-79-97
|
|||
|
15-71-99 **
|
|||
|
15-71-48
|
|||
|
15-77-40
|
|||
|
15-75-45
|
|||
|
|
|||
|
TOLUCA (721) 6-53-00 **
|
|||
|
6-53-30 **
|
|||
|
6-53-52 **
|
|||
|
6-53-18 **
|
|||
|
1200 bps 6-52-07
|
|||
|
6-52-29
|
|||
|
6-52-41
|
|||
|
6-52-63
|
|||
|
|
|||
|
TORREON 1200 bps (17) 16-50-40
|
|||
|
16-52-38
|
|||
|
16-59-92
|
|||
|
16-50-30 **
|
|||
|
16-50-82 **
|
|||
|
1200 bps 16-51-86
|
|||
|
1200 bps 16-50-92
|
|||
|
|
|||
|
VERACRUZ (29) 31-40-33
|
|||
|
31-41-58
|
|||
|
1200 bps 31-42-83
|
|||
|
31-44-08
|
|||
|
31-45-33
|
|||
|
31-46-58
|
|||
|
31-47-83
|
|||
|
31-49-08
|
|||
|
31-50-33
|
|||
|
31-51-58
|
|||
|
31-52-83
|
|||
|
31-54-08
|
|||
|
31-55-11 **
|
|||
|
31-56-36 **
|
|||
|
31-57-61 **
|
|||
|
31-58-86 **
|
|||
|
|
|||
|
VILLAHERMOSA 300 bps (931) 3-14-02 **
|
|||
|
3-14-55 **
|
|||
|
3-15-69 **
|
|||
|
1200 bps 3-15-10
|
|||
|
3-14-55
|
|||
|
3-15-64
|
|||
|
3-15-03 *
|
|||
|
|
|||
|
* DA%O MODEM
|
|||
|
** DA%O L.P.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- NETHERLANDS ---
|
|||
|
|
|||
|
NETHERLANDS - BT TYMNET GLOBAL NETOWRK CONNECTION SERVICE
|
|||
|
|
|||
|
|
|||
|
BT TYMNET Network Name: BT TYMNET
|
|||
|
K.P. Van Der Mandelelaan 78
|
|||
|
3062 MB Rotterdam
|
|||
|
The Netherlands
|
|||
|
|
|||
|
Contact: Sales and Marketing Telephone: (31.10)452 3866
|
|||
|
Fax: (31.10)453 2590
|
|||
|
|
|||
|
1. ACCESS/SPEEDS: Async dial-in speeds: 300-9600 bps
|
|||
|
Async leased speeds: 300-9600 bps
|
|||
|
Sync. leased speeds: 4800-14400 bps
|
|||
|
Higher speeds available upon request
|
|||
|
|
|||
|
2. PROTOCOLS: Async (X.28), X.25, IBM 3270 BSC, 3270 SNA/SDLC, SDLC,
|
|||
|
RJE/HASP, other services available upon request.
|
|||
|
|
|||
|
3. PRICES: All prices are in U.S. Dollars. Billing in local currency
|
|||
|
is available.
|
|||
|
|
|||
|
Dial-up Async (X.28) Service:
|
|||
|
|
|||
|
The following hourly rates ($/hour) apply depending on the destination
|
|||
|
of the call from the GNS public async port in the Netherlands. There
|
|||
|
are no data volume charges:
|
|||
|
|
|||
|
--------------------------------------------------------------
|
|||
|
FROM: | TO:
|
|||
|
| EUR-I EUR-II USA JAPAN PACIFIC
|
|||
|
-------------|------------------------------------------------
|
|||
|
BT TYMNET |
|
|||
|
Netherland s | $8.00 $10.00 $18.00 $24.00 $24.00
|
|||
|
(EUR-I) |
|
|||
|
--------------------------------------------------------------
|
|||
|
|
|||
|
EUR-I: France, Netherlands, United Kingdom, Germany, Belgium
|
|||
|
Denmark, Switzerland
|
|||
|
EUR-II: Italy, Sweden
|
|||
|
PACIFIC: Austrlia
|
|||
|
|
|||
|
NOTE: Minimum session charge is 2.5 minutes
|
|||
|
|
|||
|
CONTACT YOUR SALES REPRESENTATIVE FOR DETAILED INFORMATION
|
|||
|
AND ADDITIONAL SERVICES.
|
|||
|
|
|||
|
4. COMMENTS:
|
|||
|
|
|||
|
---------------------OPERATIONAL/TECHNICAL INFORMATION-------------------
|
|||
|
|
|||
|
1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
|
|||
|
Contact: Customer Support
|
|||
|
Hours of Operation: 8:30am - 6:30pm local/M-F
|
|||
|
Telephone: (31.10)452 3866
|
|||
|
Fax: (33.10)453 2590
|
|||
|
After hours contact the 24 Customer Support Center in Vienna, Virginia
|
|||
|
at (703) 442-0145
|
|||
|
|
|||
|
2. SERVICE INFORMATION BULLETIN BOARD ADDRESS: Username INFORMATION
|
|||
|
Username HELP
|
|||
|
|
|||
|
3. TEST ADDRESS: 3106000715
|
|||
|
|
|||
|
4. ASYNC ACCESS PROCEDURES:
|
|||
|
|
|||
|
Upon modem connect. . .
|
|||
|
|
|||
|
Receive: Please type your terminal identifier
|
|||
|
(NOTE: String of characters may appear at speeds higher
|
|||
|
than 300 bps)
|
|||
|
Send: "a"
|
|||
|
Receive: Please log in:
|
|||
|
Send: TYMNET username (NUI)
|
|||
|
Receive: Password:
|
|||
|
Send: Your password
|
|||
|
|
|||
|
5. TYMUSA AVAILABLE: Yes
|
|||
|
|
|||
|
6. DEFAULT PAD SETTING: N/A
|
|||
|
|
|||
|
7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS:
|
|||
|
|
|||
|
City/Territory Modem/Speed Access Number
|
|||
|
-------------------------------------------------------------------
|
|||
|
Alkmaar 300-9600 MNP (011.31.72) 155190
|
|||
|
Amsterdam 300-9600 MNP (011.31.20) 6610094
|
|||
|
Eindhoven 300-9600 MNP (011.31.4902)45530
|
|||
|
The Hague 1200 (011.31.70) 3814641
|
|||
|
300-2400 MNP (011.31.70) 3475032
|
|||
|
4800-9600 MNP (011.31.70) 3818448
|
|||
|
Rotterdam 300-9600 MNP (011.31.10) 4532002
|
|||
|
-------------------------------------------------------------------
|
|||
|
|
|||
|
NOTE: Local X.25 gateway to PTT Datanet-1 service
|
|||
|
|
|||
|
NUA: international: 2041170495
|
|||
|
national: 1170495
|
|||
|
|
|||
|
|
|||
|
NETHERLANDS - ENHANCED GLOBAL CONNECTION SERVICE
|
|||
|
|
|||
|
|
|||
|
1. TYMUSA Gateway Host Number: 5393
|
|||
|
|
|||
|
2. Dialup Node(s): 3462
|
|||
|
|
|||
|
3. Rate: $15.00/hour and $0.80/Kchar
|
|||
|
|
|||
|
4. Dialup Locations and Numbers:
|
|||
|
|
|||
|
Alkmaar
|
|||
|
(011.31.72) 155190 3-2400 MNP
|
|||
|
|
|||
|
Amsterdam
|
|||
|
(011.31.20) 6610094 300/1200/1200/75/2400/9600 MNP
|
|||
|
|
|||
|
Eindhoven
|
|||
|
(011.31.4902)45530 3-12-2400 V.21/22/bis
|
|||
|
|
|||
|
The Hague
|
|||
|
(011.31.70) 3814641 1200
|
|||
|
(011.31.70) 3475032 300-2400 MNP
|
|||
|
(011.31.70) 3818448 4800/9600 MNP
|
|||
|
|
|||
|
Rotterdam
|
|||
|
(011.31.10) 4532002 300/1200/1200-75/2400/9600 MNP
|
|||
|
|
|||
|
5. Trouble Reporting Center:
|
|||
|
|
|||
|
Support (local)
|
|||
|
Phone: (011.31) 703820044
|
|||
|
Hours of Operation: M-F 8am - 5pm local time
|
|||
|
Contact: Jean Van Waterschoot (Customer Support)
|
|||
|
|
|||
|
Support (Regional)
|
|||
|
Phone: (011.33.1)49112121
|
|||
|
Hours of Operation: M-F 9:00am - 5:30pm Paris, France
|
|||
|
Contact: Trouble Reporting Center
|
|||
|
|
|||
|
|
|||
|
NETHERLANDS - BASIC GLOBAL CONNECTION SERVICE
|
|||
|
|
|||
|
|
|||
|
PTT Telecom BV Net. Name: DATANET-1
|
|||
|
Telematics Systems and Services DNIC: 2041
|
|||
|
P.O. Box 30150
|
|||
|
2500 GD's-Gravenhage
|
|||
|
The Netherlands
|
|||
|
Contact: Telematics Services Tel. (31.70) 43.86.11
|
|||
|
Mr. Peter Heuseveldt Tel. (31.70) 43.61.77
|
|||
|
Fax (31.70) 43.76.05
|
|||
|
(31.70) 43.75.67
|
|||
|
Telex: (844) 30515 or 31111
|
|||
|
OnTyme: INTL.DCTDATA
|
|||
|
|
|||
|
1. ACCESS/SPEEDS: Asynchronous dial-up 300, 1200, 1200/75 and 2400 bps
|
|||
|
Synchronous leased lines: 2400, 4800, 9600, 48000 bps
|
|||
|
|
|||
|
2. PROTOCOLS: X.25, X.28, X.75
|
|||
|
Asynchronous terminal access.
|
|||
|
MNP protocol is supported with async speeds of 1200
|
|||
|
and 2400 bit/s.
|
|||
|
|
|||
|
3. PRICES: All prices are in Dutch Florins (DFL).
|
|||
|
(1$ US = 2.08 DFL 7/88)
|
|||
|
|
|||
|
1. Permanent X.25 Connection
|
|||
|
|
|||
|
a) X.25 Single Connection
|
|||
|
|
|||
|
- Installation Charge
|
|||
|
|
|||
|
2400 bps (one logical channel) DFL 500.00
|
|||
|
2400 bps DFL 500.00
|
|||
|
4800 bps DFL 500.00
|
|||
|
9600 bps DFL 500.00
|
|||
|
48000 bps DFL 2000.00
|
|||
|
64000 bps DFL 2000.00
|
|||
|
|
|||
|
- Monthly Subscription
|
|||
|
|
|||
|
2400 bps (one logical channel) DFL 235.00
|
|||
|
2400 bps DFL 375.00
|
|||
|
4800 bps DFL 575.00
|
|||
|
9600 bps DFL 750.00
|
|||
|
48000 bps DFL 2000.00
|
|||
|
64000 bps DFL 2000.00
|
|||
|
|
|||
|
Extra logical channels for DFL 5.00
|
|||
|
incoming and outgoing calls
|
|||
|
|
|||
|
b) X.25 Multiple Port Connection
|
|||
|
|
|||
|
Installation Monthly
|
|||
|
Charge Subscription
|
|||
|
|
|||
|
2400 bps DFL 1500,00 DFL 1100.00
|
|||
|
4800 bps DFL 1500,00 DFL 1350.00
|
|||
|
9600 bps DFL 1500,00 DFL 1550.00
|
|||
|
|
|||
|
Per extra pair of modems DFL 175.00
|
|||
|
|
|||
|
c) Traffic Charges to the USA
|
|||
|
|
|||
|
Connect Time - per minute DFL 0.25
|
|||
|
Transmission - per segment DFL 0.0125
|
|||
|
Call set-up - per call DFL 0.06
|
|||
|
|
|||
|
2. PAD Connection
|
|||
|
|
|||
|
a) Monthly subscription per NUI DFL 30.00
|
|||
|
|
|||
|
b) Traffic Charges to the USA
|
|||
|
|
|||
|
Connect Time - per minute DFL 0.25
|
|||
|
Transmission - per segment DFL 0.015
|
|||
|
Call set-up - per call DFL 0.06
|
|||
|
|
|||
|
c) Telephone Charges
|
|||
|
|
|||
|
DFL 0.15 per 5 minutes.
|
|||
|
|
|||
|
Telephone charges are billed separately.
|
|||
|
|
|||
|
Service Lead Times: One week delay to obtain an NUI.
|
|||
|
|
|||
|
4. COMMENTS: PAD Connection:
|
|||
|
|
|||
|
It is possible to communicate via the PAD in 2 ways:
|
|||
|
|
|||
|
- identified, this means that you need a PTT
|
|||
|
identifier and a password ;
|
|||
|
- unidentified, you use no threshold access for which
|
|||
|
no identifier or password is required.
|
|||
|
|
|||
|
The communication costs are charged to the Host and
|
|||
|
the user does not need a subscription to the PAD,
|
|||
|
a form of an electronic answer number is created for
|
|||
|
the users.
|
|||
|
|
|||
|
--------------- OPERATIONAL/TECHNICAL INFORMATION-------------------
|
|||
|
|
|||
|
1. FIRST LINE CUSTOMER SERVICE/TROUBLE REPORTING:
|
|||
|
Contact: PTT - Datacommunications
|
|||
|
Hours of Operation: 24 Hours/7 Days
|
|||
|
Phone: (31) 2159 36604
|
|||
|
Telex: (844) 43198 DACOM NL
|
|||
|
Fax: (31) 2159 17393
|
|||
|
|
|||
|
2. SERVICE INFORMATION ADDRESS: 20412900090
|
|||
|
|
|||
|
3. TEST ADDRESS:
|
|||
|
Echo: 2041900
|
|||
|
|
|||
|
4. ASYNC ACCESS PROCEDURES:
|
|||
|
|
|||
|
LOGON:
|
|||
|
|
|||
|
1. On modem connect you will recieve the msg: TER
|
|||
|
|
|||
|
2. Login string: A;1;<nui>;<password>;03106xxxxxx[P|DCUD]<cr>
|
|||
|
^ ^
|
|||
|
optional CUD __|______|
|
|||
|
|
|||
|
5. TYMUSA AVAILABLE: Yes (Please contact your sales representative
|
|||
|
for additional information and access numbers)
|
|||
|
|
|||
|
6. DEFAULT PAD SETTING:
|
|||
|
|
|||
|
1:1, 2:1, 3:2, 4:0, 5:0, 6:5, 7:21, 8:0, 9:0, 10:0, 11:x
|
|||
|
12:1, 13:0, 14:0, 15:1, 16:127, 17:24, 18:18, 19:0, 20:0
|
|||
|
21:0, 22:0
|
|||
|
|
|||
|
PAD Profiles:
|
|||
|
|
|||
|
Interactive 1
|
|||
|
PROF 10 = 1:1, 2:1, 3:2, 4:0, 5:0, 6:5, 7:21, 8:0, 9:0, 10:0,
|
|||
|
11:x, 12:1, 13:6, 14:0, 15:1, 16:127, 17:24, 18:18,
|
|||
|
19:2, 20:0, 21:0, 22:0
|
|||
|
|
|||
|
Transparent/File Transfer/Block Mode
|
|||
|
PROF 91 = 1:0, 2:0, 3:0, 4:20, 5:0, 6:0, 7:2, 8:0, 9:0, 10:0,
|
|||
|
11:x, 12:0, 13:0, 14:0, 15:0, 16:127, 17:24, 18:0,
|
|||
|
19:1, 20:0, 21:0, 22:0
|
|||
|
|
|||
|
|
|||
|
7. ASYNC DIAL-IN ACCESS TELEPHONE NUMBERS:
|
|||
|
|
|||
|
City/Territory V.21/300 V.23/1200/75 V.22/1200 and 2400 MNP
|
|||
|
---------------------------------------------------------------------
|
|||
|
REGION 1
|
|||
|
|
|||
|
ALKMAAR (072) 624814 624814 624814
|
|||
|
AMERSFOORT (033) 620492 620492 620492
|
|||
|
AMSTERDAM (020) 460031 460031 460031
|
|||
|
of (020) 6680531 6680531 6680531
|
|||
|
HAARLEM (023) 358324 272134 276284
|
|||
|
LELYSTAD (03200) 62040 62040 62040
|
|||
|
UTRECHT (030) 310032 340414 321114
|
|||
|
|
|||
|
REGION 2
|
|||
|
|
|||
|
ARNHEM (085) 432778 432778 432778
|
|||
|
DEVENTER (05700) 42011 42011 42011
|
|||
|
EMMEN (05910) 42600 42600 42600
|
|||
|
GRONINGEN (050) 143666 143555 143777
|
|||
|
HENGELO (074) 438355 438555 438255
|
|||
|
LEEUWARDEN (058) 128986 129188 129382
|
|||
|
MAASTRICHT (043) 434900 434020 435700
|
|||
|
NIJMEGEN (080) 600101 600015 600204
|
|||
|
VENLO (077) 544411 544411 544411
|
|||
|
ZWOLLE (038) 221133 221133 221133
|
|||
|
|
|||
|
REGION 3
|
|||
|
|
|||
|
BREDA (076) 227032 227040 226525
|
|||
|
DORDRECHT (078) 310811 310811 310811
|
|||
|
EINDHOVEN (040) 456345 440085 454585
|
|||
|
GOES (01100) 31006 31006 31006
|
|||
|
HERTOGENB. (073) 890840 890840 890840
|
|||
|
ROTTERDAM (010) 4140877 4334211 4045377
|
|||
|
TILBURG (013) 365440 365440 365440
|
|||
|
ZOETERMEER (079) 214092 212001 521547
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
--- NEW ZEALAND ---
|
|||
|
|
|||
|
NEW ZEALAND - BASIC GLOBAL CONNECTION SERVICE
|
|||
|
|
|||
|
|
|||
|
Last Update: June 29, 1990
|
|||
|
|
|||
|
Net. Name: PACNET
|
|||
|
Telecom Networks and International Ltd. DNIC: 5301
|
|||
|
Telecom Networks House
|
|||
|
Switched Data Network Section
|
|||
|
68-86 Jervois Quay
|
|||
|
P.O. Box 1092
|
|||
|
Wellington 1, New Zealand
|
|||
|
Contact: Alan Townsend Phone: (64.4)496 6132
|
|||
|
Telex: 791 31688
|
|||
|
Fax: (64.4) 496 6125
|
|||
|
|
|||
|
|
|||
|
1. ACCESS/SPEEDS: Dial-up: 300, 1200, 1200/75, 2400
|
|||
|
Leased Line: 300 and 1200 bps asynchronous
|
|||
|
Leased Line: 2400, 4800 and 9600 bps synchronous
|
|||
|
|
|||
|
2. PROTOCOLS: X.25, Asynchronous terminal interface
|
|||
|
|
|||
|
3. PRICES: All prices are in New Zealand Dollars. (NZ Dls)
|
|||
|
(1$ US = 1.7 NZ Dls. 7/90)
|
|||
|
|
|||
|
Traffic Charges to the USA:
|
|||
|
Time: NZ 12.00/hr
|
|||
|
Volume: NZ 12.00/ksegment
|
|||
|
|
|||
|
Minimum Charge:
|
|||
|
For successful call: 6 segments
|
|||
|
For unsuccessful call: 2 segments
|
|||
|
|
|||
|
Dial-Up Service:
|
|||
|
Registration Fee: NZ 18.18 (one time)
|
|||
|
Monthly Charge: NZ 5.00/NUI
|
|||
|
|
|||
|
Leased Line Service:
|
|||
|
|
|||
|
Async Connections:
|
|||
|
Installation Charge Monthly Charge
|
|||
|
300bps NZ 240.00 NZ 190.00
|
|||
|
1200bps NZ 280.00 NZ 255.00
|
|||
|
|
|||
|
|
|||
|
Synchronous Connections:
|
|||
|
Installation Charge Monthly Charge
|
|||
|
2400bps NZ 280.00 NZ 160.00
|
|||
|
4800bps NZ 280.00 NZ 170.00
|
|||
|
9600bps NZ 280.00 NZ 190.00
|
|||
|
48kbps NZ 1680.00 NZ 660.00
|
|||
|
|
|||
|
============================================================================
|
|||
|
|
|||
|
|
|||
|
/ /
|
|||
|
/ NIA073 / File 05 /
|
|||
|
/ Report On Interexchange Carriers /
|
|||
|
/ Compiled By The FCC /
|
|||
|
/ /
|
|||
|
|
|||
|
The following list outlines all Long Distance carriers purchasing
|
|||
|
switched access as of March, 1991. The list also outlines the type
|
|||
|
of access purchased. With feature group A and B, the caller gains
|
|||
|
access to the carrier's facilities by first dialing a remote access
|
|||
|
site. Feature group D indicates equal access.
|
|||
|
|
|||
|
|
|||
|
SERVICE ACCESS TYPE
|
|||
|
-------------------------------------------------------------
|
|||
|
10 Plus Teleservices D
|
|||
|
Abcom A
|
|||
|
ACC Long Distance Corporation A B D
|
|||
|
Access Long Distance B D
|
|||
|
Access Plus A D
|
|||
|
Action Telecommunications Co. A B D
|
|||
|
Advanced Business Telephone, Inc. A B D
|
|||
|
Advanced Communication Technologies, Inc. A B D
|
|||
|
Advanced Communications Systems, Inc. A B D
|
|||
|
Advanced MKG, SVCS., dba Dial Anywhere A B D
|
|||
|
Aero Mayflower A
|
|||
|
Afford-A-Call A B D
|
|||
|
Allnet Comm. Svs., Inc. (LDX, Lexitel) A B D
|
|||
|
Altcom Corp. A
|
|||
|
Alternate Communication Technology, Inc. B D
|
|||
|
A.B.E. of Alabama, Inc., dba Econoline A
|
|||
|
Americall Corporation (Calif.) A B D
|
|||
|
Americall Systems of Louisville A B D
|
|||
|
American Long Distance Co. D
|
|||
|
American Long Distance Exchange, Inc. D
|
|||
|
American Long Lines A B D
|
|||
|
American National Telcom A B D
|
|||
|
American Network Exchange, Inc. A B D
|
|||
|
American Sharecom, Inc A B D
|
|||
|
American Telco, Inc. A B D
|
|||
|
American Telco Network Services, Inc. A B D
|
|||
|
American Telecommunications Holdings, Ltd. B D
|
|||
|
American Telesystems A B D
|
|||
|
Amerisystems, Inc B D
|
|||
|
Amvox D
|
|||
|
Ascom Autelca A
|
|||
|
Associated Telenet, Inc. A B D
|
|||
|
Associated Terminating Network A
|
|||
|
ATC A B D
|
|||
|
Atlantic Connection, Ltd. A
|
|||
|
ATX Telecommunications Services A B D
|
|||
|
AT&T Communications A D
|
|||
|
Austin Bestline A B D
|
|||
|
Automated Communications, Inc. B D
|
|||
|
Bay Communications A B D
|
|||
|
Bittel Telecommunications Corp. A B D
|
|||
|
Biz Tel Long Distance Telephone Co. D
|
|||
|
Biztel, Ltd. A B
|
|||
|
Bi-State Telephone Co. A
|
|||
|
Budget Telephone A
|
|||
|
Burlington Telephone Company A B D
|
|||
|
Business Communications Network, Inc. D
|
|||
|
Business Telecom, Inc. A B D
|
|||
|
Cable & Wireless Communications, Inc. (TDX) A B D
|
|||
|
Call America A B D
|
|||
|
Call America Business Comm. Corp. A B D
|
|||
|
Call America of Riverside A B D
|
|||
|
Call America/Palm Desert A B
|
|||
|
Call Savers of Fresno B D
|
|||
|
Call Technology Corp. of Philadelphia B D
|
|||
|
Call USA Corp. B D
|
|||
|
Call-USA, Inc. B
|
|||
|
Cambridge Communications A B D
|
|||
|
Cam-Net, Inc. A B D
|
|||
|
Capital Network System, Inc. A B D
|
|||
|
Capital Telecommunications, Inc. A B D
|
|||
|
Card*Tel A
|
|||
|
Centel Net D
|
|||
|
Central Lines A
|
|||
|
Central New York Talk-Transit A B
|
|||
|
Central Teleohone Systems, Inc. A B
|
|||
|
Central Texas Long Distance, Inc. A B D
|
|||
|
Century Area Long Lines A
|
|||
|
Century Network, Inc. A B
|
|||
|
Chadwick Telephone A B D
|
|||
|
Charter Corporation dba TRI-J A B D
|
|||
|
Charter Network A B D
|
|||
|
Chautauqua Tele-Saver A
|
|||
|
Checkrite A B
|
|||
|
Chicago Communications Services, Inc. A
|
|||
|
Cincinnati Bell Long Distance, Inc. B D
|
|||
|
Citynet Communications, Inc. B D
|
|||
|
Cleartel Communications B D
|
|||
|
Clifton Phone Systems D
|
|||
|
Coachella Valley Communications B D
|
|||
|
Coastal Telephone Company B D
|
|||
|
Colorado River Communications B D
|
|||
|
Com Systems Network Services A B D
|
|||
|
Comantel A
|
|||
|
Commander Systems, Inc. A
|
|||
|
Communication Cable Laying Co., Inc. A B D
|
|||
|
The Communigroup of N. Alabama A
|
|||
|
Communique Telecommunications, Inc. D
|
|||
|
Compu-Tel, Inc. A
|
|||
|
Com-Mar, Inc. A
|
|||
|
Conagra A
|
|||
|
Conifer Communications, Ltd. A B
|
|||
|
Conquest Communications Corporation B
|
|||
|
Conquest Long Distance Corp. A B D
|
|||
|
Conquest Operator Services Corp. B D
|
|||
|
Consolidated Network, Inc. B D
|
|||
|
Consortium Communications Inc. A
|
|||
|
Contact America A B D
|
|||
|
Contel ASC A B
|
|||
|
Continental Switching Corporation D
|
|||
|
Continental Telecommunications Group D
|
|||
|
Cont'l States Corp. dba TMC of Orlando D
|
|||
|
Coshocton L.D.S. A B
|
|||
|
CTI Telecommunications, Inc. A B D
|
|||
|
Custom Telecom. Network of Arizona D
|
|||
|
Cypress Telecommunications Corp. (CYTEL) A B D
|
|||
|
Dash Long Distance Service, Inc. A B D
|
|||
|
Data General Network Services A
|
|||
|
Datanet Communications, Inc. A B D
|
|||
|
Decco A
|
|||
|
Delta Communications, Inc. A B D
|
|||
|
Dial America, Inc. A B
|
|||
|
Dial-Net, Inc. A B D
|
|||
|
Digital Network, Inc. A B D
|
|||
|
Digital Signal, Inc. A
|
|||
|
Direct Communications, Inc. A B D
|
|||
|
Discount Communications Services A B
|
|||
|
Dunset A
|
|||
|
E & K Systems, Inc. A
|
|||
|
Eastern Microwave D
|
|||
|
Eastern Telelogic Corporation A D
|
|||
|
Eastern Telephone Systems, Inc. A B D
|
|||
|
Econo-Call, Inc. A B
|
|||
|
Econo-Line (Harrison, AR) B
|
|||
|
Econo. Call Long Distance Services A B D
|
|||
|
Econ-A-Call, Inc. of Heys A B D
|
|||
|
EDS A B
|
|||
|
Equicom Communications, Inc. B D
|
|||
|
Escondido Telephone Company B D
|
|||
|
Execuline of Sacramento A B D
|
|||
|
Execuline of the Northwest A B D
|
|||
|
Execulines, Inc. A
|
|||
|
FEB Corporation D
|
|||
|
Fiberfone of Florida, Inc. A B
|
|||
|
Fibernet Communications Corporation B D
|
|||
|
First Communications, Inc. (FDR) B
|
|||
|
First Data Resources, Inc. (FST) B D
|
|||
|
First Fone of Amarillo B D
|
|||
|
First Fone Long Distance B D
|
|||
|
First Interstate Service Co. B
|
|||
|
First Phone of New England A B D
|
|||
|
Flat Rate Communications B
|
|||
|
Flex Communications System A B D
|
|||
|
Fone America, Inc. A B D
|
|||
|
Fones West A
|
|||
|
Fox Communications Corp. B D
|
|||
|
Garden State Long Distance Telephone A D
|
|||
|
General Communication, Inc. A B D
|
|||
|
GEO Communications, Inc. A
|
|||
|
Glen Falls Long Distance Service A B
|
|||
|
GMW Company A B D
|
|||
|
Hart Communications Co. D
|
|||
|
Hi-Plains NTS Communications B
|
|||
|
Icon Communications, Corporation A B D
|
|||
|
Independant Long Distance D
|
|||
|
Indianapolis Telephone Corp., Inc. A
|
|||
|
Innovative Communications, Inc. B D
|
|||
|
Intelco A B D
|
|||
|
Inter Tel A
|
|||
|
International Pacific B D
|
|||
|
Internationsl Telecharge, Inc. A B D
|
|||
|
Internet Datacom, Inc. A
|
|||
|
Interstate Telephone Company A B
|
|||
|
Iowa Network Services, Inc. B D
|
|||
|
ITC Networks A B D
|
|||
|
J-Net Communications, Inc. A B D
|
|||
|
Kawahawi Company A
|
|||
|
KCC Communications D
|
|||
|
Ken-Tel Service, Inc. A B D
|
|||
|
Kentucky Telephone Corp. A B D
|
|||
|
Key System Corporation A
|
|||
|
Keystone Telecommunications, Inc. A B D
|
|||
|
Lake States Communications, Inc. D
|
|||
|
Lassman - Weber Communications, Inc. A B D
|
|||
|
LDB Corporation A B D
|
|||
|
LDDS A B D
|
|||
|
LDS of Alexandria B D
|
|||
|
LDS of Baton Rouge A B D
|
|||
|
LDS of Monroe A B D
|
|||
|
LDS of Shreveport A B D
|
|||
|
LDS of Tulsa A B D
|
|||
|
Lintel Sys. dba Lincoln Telephone L.D. B D
|
|||
|
Litel Telecommunications (Lightcall) A B D
|
|||
|
Lone Star Telecom D
|
|||
|
Long Distance Communications B D
|
|||
|
Long Distance Discount, Inc. A B D
|
|||
|
Long Distance for Less A B D
|
|||
|
Long Distance Management A B D
|
|||
|
Long Distandce Network, Inc. A D
|
|||
|
Long Distance Ohio, Inc. A B
|
|||
|
Long Distance Savers A B D
|
|||
|
Long Distance Service, Inc. A B D
|
|||
|
Long Distance Specialties Telephone Co. A B D
|
|||
|
Long Distance Telephone Savers, Inc. A B D
|
|||
|
Long Line Inc. A
|
|||
|
LTS, Inc. A B D
|
|||
|
Lufkin Tele. dba Star Tel of Lufkin A B
|
|||
|
Manitowoc Long Distance Service A D
|
|||
|
Marinette-Menominee LDS A B D
|
|||
|
Marshall LDDS A
|
|||
|
MCI A B D
|
|||
|
Metromedia/ITT A B D
|
|||
|
Metro Telephone, Inc. B D
|
|||
|
Metronet Long Distance Communications A D
|
|||
|
Mid Atlantic Telecom A B D
|
|||
|
Mid Atlantic Telephone Company A
|
|||
|
Midamerican Comm. (Midamerican L.D.) A B D
|
|||
|
Midco Communications A B D
|
|||
|
Midcom, Inc. B
|
|||
|
Midcom of Arizona, Inc. A D
|
|||
|
Midco-Tel of Aberdeen A
|
|||
|
Midwest Telephone Service, Inc. A B D
|
|||
|
Mid-Tel L.D., Inc., of Williston A B
|
|||
|
Minntelco A
|
|||
|
Mobile Comms., Corp. of America A
|
|||
|
Montana Long Distance, Inc. B D
|
|||
|
MSI Communications, Inc. B
|
|||
|
Nacogdoches Telecommunications, Inc. A B D
|
|||
|
NACT dba Network Telemanagement Services A B
|
|||
|
NAPA Valley Telecom Services A B D
|
|||
|
National Brands, Inc. B D
|
|||
|
National Network Corp. B
|
|||
|
National Technical Association dbs NTA B D
|
|||
|
National Telecommunications, Inc. A B D
|
|||
|
National Telephone Communications, Inc. A B
|
|||
|
National Telephone Exchange (N.Y.) A B D
|
|||
|
National Telephone Exchange (PA) A B
|
|||
|
National Telephone Exchange (TX) A B D
|
|||
|
National Teleservice A B D
|
|||
|
National Tele-Sav, Inc. B D
|
|||
|
NCHE Telecommunications Network, Inc. D
|
|||
|
Net Express Communications, Inc. D
|
|||
|
Netech Communications A B D
|
|||
|
Network 1, Inc. A B
|
|||
|
Network Communications, Inc. A
|
|||
|
Network Operator Services, Inc. B D
|
|||
|
Network Services, Ltd. B D
|
|||
|
Network Telecommunications A B D
|
|||
|
Network Telephone Services, Inc. D
|
|||
|
Nickle Fone A B D
|
|||
|
Norlight A
|
|||
|
North American Communications, Inc. A B D
|
|||
|
Northern Arizona Communications Corp. B D
|
|||
|
Northern Michigan L.D.S. A B
|
|||
|
Northern Wisconsin L.D.S. D
|
|||
|
Northland Telephone Systems, Ltd. A B D
|
|||
|
Northwest Network Communications, Inc. A B D
|
|||
|
Northwest Telecom, Ltd. A B D
|
|||
|
Northwest Telecomm, Co. A B D
|
|||
|
Novah of Michigan A
|
|||
|
NTS Communications, Inc. A B D
|
|||
|
NY Com, Inc. B D
|
|||
|
One Call Communications, Inc. A B D
|
|||
|
One-2-One Communications A B D
|
|||
|
Operator Service Company D
|
|||
|
Pace Long Distance Service A B D
|
|||
|
Page America Communications, Inc. A
|
|||
|
Panda Communications A
|
|||
|
Pass Word, Inc. B
|
|||
|
Payline Systems, Inc. B D
|
|||
|
Peninsula Long Distance Service, Inc. A D
|
|||
|
Penny Fone A B
|
|||
|
Petroleum Communications A
|
|||
|
Phoenix Communications Group, Inc. A B D
|
|||
|
Phoenix Network Corporation B D
|
|||
|
Phone America of Carolina A B D
|
|||
|
Phone Base Systems, Inc. D
|
|||
|
Phone One A B D
|
|||
|
Phonelink, Inc. A
|
|||
|
Phonenet, Inc. A
|
|||
|
Phonetel Technologies, Inc. D
|
|||
|
Pilgrim Telephone, Inc. D
|
|||
|
Prestwood Communications Co. A
|
|||
|
Professional Networks Management, Inc. A B D
|
|||
|
Pro-Com, Inc. A B D
|
|||
|
PSA, Inc. A B
|
|||
|
Qwest Microwave Corp. B
|
|||
|
Radius Telecommunications A
|
|||
|
RCI Long Distance A B D
|
|||
|
Resurgens Telecommunications D
|
|||
|
Roamer Services, Inc. D
|
|||
|
Rochester Telecomm Systems A
|
|||
|
San Marcos Long Distance, Inc. B
|
|||
|
Schneider Communications A B D
|
|||
|
Science Dynamics Corporation D
|
|||
|
Securitex dba Tylernet Long Distance A B D
|
|||
|
Sharecom A D
|
|||
|
Shared Use Network, Ltd. A B D
|
|||
|
Shared Use Network Service, Inc. A B D
|
|||
|
Shenandoah Long Distance Company B
|
|||
|
Sierra Telecommunications, Inc. B D
|
|||
|
SM Long Distance B D
|
|||
|
South Bay Communications, Inc. A B
|
|||
|
South Tel A B D
|
|||
|
Southern Interexchange Services, Inc. B
|
|||
|
Southnet Services, Inc. D
|
|||
|
Southwest Communications B
|
|||
|
Spectratel A
|
|||
|
St. Thomas & San Juan Telco, Inc. A
|
|||
|
Star Tel A B
|
|||
|
Star Tel of Abilene A B D
|
|||
|
Star Tel of Victoria A B D
|
|||
|
Star Tel Transmission Co., Inc. A B D
|
|||
|
Starline, Inc. B D
|
|||
|
Startec, Inc. D
|
|||
|
St. Joe Communications, Inc. D
|
|||
|
Sun Coast Comm Inc. A
|
|||
|
Sunshine Telephone, Inc. A B D
|
|||
|
Superior Telecom A B D
|
|||
|
Swiff Train Communications A B
|
|||
|
Switchboard of Oklahoma City A B
|
|||
|
Tacoma Telephone Exchange A
|
|||
|
Taconic Long Distance Service, Corp. A B D
|
|||
|
TCS Network Services A
|
|||
|
TEC West A
|
|||
|
Tel America, Inc. A B D
|
|||
|
Tel Com International, Inc. B D
|
|||
|
Tel Systems Management A
|
|||
|
Telamarketing Communications, Inc. A B D
|
|||
|
Telamarketing Communications of America D
|
|||
|
Telamarketing Communications of Arkansas A B D
|
|||
|
Telamarketing Communications of Bakersfield A B
|
|||
|
Telamarketing Communications of Baton Rouge D
|
|||
|
Telamarketing Communications of Birmingham A D
|
|||
|
Telamarketing Communications of Columbus A
|
|||
|
Telamarketing Communications of El Paso A D
|
|||
|
Telamarketing Communications of Evansville A B D
|
|||
|
Telamarketing Communications of Fresno A B
|
|||
|
Telamarketing Communications of Lafayette A D
|
|||
|
Telamarketing Communications of Louisville A D
|
|||
|
Telamarketing Communications of Milwaukee A B D
|
|||
|
Telamarketing Communications of Nashville A
|
|||
|
Telamarketing Communications of NW Indiana A
|
|||
|
Telamarketing Communications of Oklahoma A D
|
|||
|
Telamarketing Communications of Omaha A B D
|
|||
|
Telamarketing Communications of Piedmont A B D
|
|||
|
Telamarketing Communications of Providence A B D
|
|||
|
Telamarketing Communications of Raleigh A
|
|||
|
Telamarketing Communications of San Luis Obispo A B
|
|||
|
Telamarketing Communications of Savannah A
|
|||
|
Telamarketing Communications of Stockton A B
|
|||
|
Telamarketing Communications of Tri-States A B D
|
|||
|
Telamarketing Communications of Tulsa A D
|
|||
|
Telco of Baton Rouge, Inc. A B D
|
|||
|
Tele Tech, Inc. A B D
|
|||
|
Telecolumbus, USA dba Worldcom D
|
|||
|
Telecommunications Services Corporation A B D
|
|||
|
Telecommunications Consultants, Inc. B D
|
|||
|
Telecon Communications Corporation B
|
|||
|
Teledial America A B D
|
|||
|
Telefind Corporation B
|
|||
|
Telemanagement Consultants Corporation A B D
|
|||
|
Telenational Communications A B D
|
|||
|
Telephone Assoc., dba Fergus Falls LD B
|
|||
|
Telephone Assoc., dba Thief River Falls LD D
|
|||
|
Telephone Assoc. Long Distance SVCS. A B D
|
|||
|
Telephone Communications Corporation A D
|
|||
|
Telephone Connections, Inc. B
|
|||
|
Telephone Express A B D
|
|||
|
Telephone Express, Inc. A
|
|||
|
Telephone Systems A B
|
|||
|
Teleport Communications A
|
|||
|
Telepro dba Blue Ridge Telephone Company A B D
|
|||
|
Telesavers, Inc. A
|
|||
|
Telescan, Inc. B D
|
|||
|
Telesphere Network, Inc. A B D
|
|||
|
Telesphere of Houston B
|
|||
|
Tele$aver of New Mexico B D
|
|||
|
Tele-Fibernet Corporation A B D
|
|||
|
Tele-Sys, Inc. A B D
|
|||
|
Teltrust Network Service A B D
|
|||
|
Telvue Corporation B D
|
|||
|
Tel-America Network Services, Inc. A B D
|
|||
|
Tel-A-Save Communications Systems, Ltd. A B
|
|||
|
Tel-Central of Jefferson City A B D
|
|||
|
Tel-Com, Inc A B
|
|||
|
Tel-Share A B D
|
|||
|
Tel-Toll dba Econ-O Dial of Bishop A B
|
|||
|
Texas Long Distance Conroe A B
|
|||
|
Texustel, Inc. A B D
|
|||
|
The Communigroup A B D
|
|||
|
The Offshore Telephone Company A B
|
|||
|
The Pay Telephone Company B D
|
|||
|
The Switchboard A B
|
|||
|
Things, Inc. A B D
|
|||
|
Thrifty Telephone Ex. dba Ohio Digital Access B D
|
|||
|
TK Communications, Inc. A B D
|
|||
|
TMC of Lexington A B D
|
|||
|
TMC of San Diego A B D
|
|||
|
TMC of Southern Kentucky B D
|
|||
|
TMC of Southwest Florida A B D
|
|||
|
TMC of Washington, DC A B D
|
|||
|
Total-Tel USA, Inc. A B D
|
|||
|
Touch America, Inc. B D
|
|||
|
Touch-1 D
|
|||
|
To-Tel Comm Sys A
|
|||
|
Transamerica Telecommunications, Inc. A B D
|
|||
|
Transtel Comm Express Tel A
|
|||
|
Trans-Net, Inc. A B D
|
|||
|
Tri-Tel Communications A B D
|
|||
|
Tri-Tel Comunications Systems A B
|
|||
|
TRT Telecommunications Corporation A B D
|
|||
|
TTE of Charleston A D
|
|||
|
TTI Midland-Odessa B D
|
|||
|
Tuck Data Communications B
|
|||
|
Tyler Telecom A B D
|
|||
|
Tymnet A B
|
|||
|
T-Tel A B D
|
|||
|
United Comunications, Inc. B D
|
|||
|
United Telephone Co. dba Telamerica L.D. A B D
|
|||
|
United Telephone Long Distance D
|
|||
|
Unitel A D
|
|||
|
Universal Telephone Systems B D
|
|||
|
U.S. Link A B D
|
|||
|
U.S. Long Distance, Inc. D
|
|||
|
U.S. Sprint [Isacomm, Telenet, LD/USA] A B D
|
|||
|
U.S. Tele-Comm, Inc. D
|
|||
|
Valley Star-Tel A B D
|
|||
|
Valley Wats A B D
|
|||
|
Valu-Line of Amarillo A B D
|
|||
|
Valu-Line of Angletown A
|
|||
|
Valu-Line of Kansas, Inc. A B
|
|||
|
Valu-Line of Longview, Inc. A B D
|
|||
|
Valu-Line of of St. Joseph A D
|
|||
|
Valu-Line of of Wichita Falls A B D
|
|||
|
Vartec National, Inc. A B D
|
|||
|
Vertelco Systems A B
|
|||
|
Virtual Network Services Corp. A B D
|
|||
|
Vista-United Telecommunications A
|
|||
|
Vortel Communications, Inc. A B D
|
|||
|
VTA, Inc. D
|
|||
|
VYVX Telecom, Inc. A B D
|
|||
|
West Coast Telecommunications, Inc. A B D
|
|||
|
Westcom Data Tel A
|
|||
|
Westcom Long Distance A B
|
|||
|
Westel, Inc. A B D
|
|||
|
Westel Communications (Telamarketing Comm) A B D
|
|||
|
Western Express Communications, Inc. A
|
|||
|
Western Information Systems, Inc. A B
|
|||
|
Western Oklahoma Information Systems A B D
|
|||
|
Western Telenet, Inc. A D
|
|||
|
WI Amer Sharecom Inc. A
|
|||
|
Wiles Communication Service B D
|
|||
|
Williams Telecommunications Group A
|
|||
|
Wisconsin L.D.S. B D
|
|||
|
Wylon A B D
|
|||
|
Yavapai Telephone Exchange A B D
|
|||
|
-------------------------------------------------------------
|
|||
|
|
|||
|
=============================================================================
|
|||
|
|
|||
|
|
|||
|
/ /
|
|||
|
/ NIA073 / File 06 /
|
|||
|
/ Vox Populi: /
|
|||
|
/ NIA News /
|
|||
|
/ /
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Date: July 22, 1991
|
|||
|
Source: AT&T Newsbriefs
|
|||
|
C. Sources: San Fransisco Chronicle (7/20/91), Dallas Times Herald (7/20/91)
|
|||
|
|
|||
|
A prankster who intercepted and rerouted confidential telephone messages from
|
|||
|
voice mail machines in City Hall <of Houston, Texas> prompted officials to pull
|
|||
|
the plug on the phone system. The city purchased the high-tech telephone
|
|||
|
system in 1986 for $28 million. But officials forget to require each worker to
|
|||
|
use a password that allows only that worker to retrieve or transfer voice
|
|||
|
messages from their "phone mailboxes," said AT&T spokesman Virgil Wildey. As a
|
|||
|
result, Wildey said, someone who understands the system can transfer messages
|
|||
|
around, creating chaos.
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Georgia's New Area Code
|
|||
|
Date: July 1991
|
|||
|
Source: Southern Bell Customer Newsletter
|
|||
|
|
|||
|
Telephone use in Georgia has increased so rapidly -- caused by increased
|
|||
|
population and the use of services like fax machines and mobile telephones --
|
|||
|
that we are running out of telephone numbers.
|
|||
|
|
|||
|
Southern Bell will establish a new area code -- 706 -- in Georgia in May 1992.
|
|||
|
The territory currently designated by the 404 area code will be split.
|
|||
|
|
|||
|
Customers in the Atlanta Metropolitan local calling area will continue
|
|||
|
to use the 404 area code. Customers outside the Atlanta Metropolitan toll free
|
|||
|
calling area will use the 706 area code. The 912 area code (South Georgia)
|
|||
|
will not be affected by this change.
|
|||
|
|
|||
|
We realize the transition to a new area code will take some getting used to.
|
|||
|
So, between May 3, 1992 and August 2, 1992, you can dial EITHER 706 or 404 to
|
|||
|
reach numbers in the new area. After August 2, 1992, the use of the 706 area
|
|||
|
code is required.
|
|||
|
|
|||
|
We are announcing the new area code far in advance to allow customers to plan
|
|||
|
for the change.
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Countywide Calling For Southern Bell Customers
|
|||
|
Date: July 1991
|
|||
|
Source: Southern Bell Customer Newsletter
|
|||
|
|
|||
|
As required by legislation enacted by the Georgia General Assembly and by order
|
|||
|
of Georgia Public Service Commission, beginning July 1, 1991, you will be able
|
|||
|
to make calls within your county free of toll charges.
|
|||
|
|
|||
|
On July 1, calls within your county boundary that were previously long-distance
|
|||
|
calls are now local calls. Therefore, no itemization or toll charges will
|
|||
|
appear on your telephone bill for calls within your county.
|
|||
|
|
|||
|
If you currently use the "1" plus 10-digit dialing or "1" plus seven-digit
|
|||
|
dialing, you should continue that same dialing pattern with the implementation
|
|||
|
of countywide calling on July 1.
|
|||
|
|
|||
|
In addition, you can obtain a telephone number within your county by dialing
|
|||
|
411 for Directory Assistance with applicable charges applying to these calls.
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Some Bellcore Acroynms
|
|||
|
Source: Telecom Digest
|
|||
|
|
|||
|
BCR Bell Communications Research
|
|||
|
FCIF FACS Component Interface Format *
|
|||
|
(FACS = Facility Assignment and Control System *)
|
|||
|
LUSI Local User System Interface
|
|||
|
NMA Network Monitoring and Analysis System
|
|||
|
RUSI Remote User System Interface
|
|||
|
SCCS Switching Control Center System *
|
|||
|
SEAS Signaling Engineering and Administration System *
|
|||
|
SOP Service Order Processor *
|
|||
|
SSP Service Switching Point *
|
|||
|
TOP Transactions-Oriented Protocol *
|
|||
|
UPL User Program Layer
|
|||
|
USL User System Language
|
|||
|
|
|||
|
* = belongs to Bellcore
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Source: United Press Wire
|
|||
|
|
|||
|
BALTIMORE (UPI) -- Chesapeake and Potomac Telephone Co. wants to
|
|||
|
expand its Caller ID system to businesses with centrex systems.
|
|||
|
|
|||
|
C&P has submitted a plan to the Public Service Commission that
|
|||
|
would allow any business with three or more lines to buy Caller ID.
|
|||
|
|
|||
|
The service, which permits users to obtain the numbers of incoming
|
|||
|
calls, has been available in Maryland since October, 1989.
|
|||
|
|
|||
|
So far, Caller ID mainly has been marketed and sold as a service
|
|||
|
for residential and small business customers.
|
|||
|
|
|||
|
It also has been available to large businesses with PBX switchboards
|
|||
|
on a special-order basis.
|
|||
|
|
|||
|
But the service has not been widely available to C&P's 11,000
|
|||
|
business customers with centrex. Centrex are large-scale
|
|||
|
telecommunications systems that can handle anywhere from three to
|
|||
|
10,000 or more telephone lines.
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Teenage Hacker Emulates Hess
|
|||
|
Source: Summarised from Computer Weekly
|
|||
|
Date: 8th August 1991.
|
|||
|
|
|||
|
A 16 year old schoolboy named Jamie Moulding has been cautioned by
|
|||
|
plain-clothed police after hacking into a military computer and trying to sell
|
|||
|
secrets to the USSR. He claims to have read the Ministry of Defence personnel
|
|||
|
and payroll files. One computer he entered held details of a British Army tank
|
|||
|
control system. Moulding first incorporated details of the system into his own
|
|||
|
simulation package, and then phoned the Soviet Union's London embassy to try to
|
|||
|
sell the information. Next day two policemen turned up at his home and spoke
|
|||
|
to his parents.
|
|||
|
|
|||
|
Moulding's telephone bills were unwittingly paid by his school. He wrote an
|
|||
|
autodialer program and an automatic hack program which "planted a command which
|
|||
|
led to a display of passwords".
|
|||
|
|
|||
|
DEC denied that its systems had been hacked. The police officers were
|
|||
|
unavailable for comment.
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Electronic Mail Beams Shuttle's Message Home
|
|||
|
By Joe Abernathy and Mark Carreau
|
|||
|
Source: Houston Chronicle, Page 1A, Copyright 1991
|
|||
|
Date: August 5th, 1991
|
|||
|
|
|||
|
Electronic mail networks, the message medium of the information age, made
|
|||
|
their debut in the space age Sunday aboard the shuttle Atlantis as part of an
|
|||
|
effort to develop a communications system for a future space station.
|
|||
|
Details of the test were being closely guarded because of concerns over a
|
|||
|
possible hacker incident or "public free-for-all" on the nation's computer
|
|||
|
networks, according to one engineer involved with the project. Privacy and
|
|||
|
medical ethics also loom large as issues. [...]
|
|||
|
Electronic mail offers a new way for astronauts to stay in touch with their
|
|||
|
families, Mission Control, and potentially, the millions of people who use the
|
|||
|
nation's interlinked computer networks. It could produce far-reaching change in
|
|||
|
the way scientists and others interact with the space program. Currently, only
|
|||
|
the shuttle communicator is allowed to talk with the astronauts during a
|
|||
|
flight, except for a private medical conference each day. E-mail could change
|
|||
|
that by letting any number of people exchange information, while scientists and
|
|||
|
engineers on the ground could assume direct control over their experiments in
|
|||
|
space.
|
|||
|
[Bryon] Han and fellow Apple employees Michael Silver and James Beninghaus
|
|||
|
have donated their time to the project. They are using low-cost, commercially
|
|||
|
available products, rather than the costly custom products often used in
|
|||
|
science. [!!!] The e-mail will play a role in controlling experiments,
|
|||
|
electronic flight information, and transfer of experiment results to the
|
|||
|
ground, Han said, as well as sending data up to the shuttle.
|
|||
|
In the future, the system might be used to transmit and manipulate
|
|||
|
information from the many medical experiments NASA conducts. But this raises a
|
|||
|
number of problems regarding privacy and medical ethics. For example, one
|
|||
|
experiment in this flight seeks to correct a blood-flow problem associated with
|
|||
|
weightless ness that causes some astronauts to faint upon their return to
|
|||
|
Earth. But this experiment is being monitored with the same Apple computer
|
|||
|
that is playing host to the e-mail system. Even though the results aren't
|
|||
|
being transmitted over computer networks this time, they might be next time --
|
|||
|
and computer networks are notoriously insecure.
|
|||
|
Inquisitive computer enthusiasts -- hackers -- are in fact one of NASA's
|
|||
|
chief concerns in regard to the use of electronic mail. The space agency
|
|||
|
initially sought to conduct the tests without publicity, but word quickly
|
|||
|
percolated around the nation's computer networks -- perhaps indicating that the
|
|||
|
concerns were justified. A chorus of calls was heard requesting the e-mail
|
|||
|
address of the astronauts -- but that raised another problem more pressing than
|
|||
|
any threat from malicious hacking, that of capacity.
|
|||
|
"We have things we need to accomplish with the limited amount of time we
|
|||
|
have, and we do have a very limited amount of data we can move between Mission
|
|||
|
Control and the orbiter," said Deborah Muratore, an engineer in the space
|
|||
|
station support office at Johnson Space Center and the experiment manager.
|
|||
|
In addition to voice communication, the shuttles are equipped with Teletype
|
|||
|
and fax machines for the transmis sion and reception of printed material and
|
|||
|
even photo graphs.
|
|||
|
"Conceivably, everything they move that way could be moved from computer to
|
|||
|
computer," Muratore said. "From a space station standpoint it would be much
|
|||
|
preferable to transfer the information electronically without paper in the loop
|
|||
|
the way we do today on the shuttle." "Paper is going to be a limited
|
|||
|
resource, something that has to be thrown away or reused on the space
|
|||
|
station," she said. "It becomes trash. So the more we can eliminate on the
|
|||
|
space station the better off we are."
|
|||
|
The current experiment does not represent the first time that civilians have
|
|||
|
had a direct communications link with those in space. Since January, the Soviet
|
|||
|
space station Mir has maintained a "mail drop" for ham radio operators to use
|
|||
|
in leaving messages for the cosmonauts. "It's very similar" in function, said
|
|||
|
Gary Morris, a former member of the Johnson Space Center Amateur Radio Club who
|
|||
|
now lives in San Diego. "The packet bulletin board system on Mir allows an
|
|||
|
amateur (ham radio operator) on the ground to leave mail messages. "What
|
|||
|
they're doing with the Mac is different in that they're going through the whole
|
|||
|
(electronic mail) network. It's much more complex."
|
|||
|
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Pentagon computer cracked by teen-age hacker in Israel
|
|||
|
Source: Houston Chronicle News Service
|
|||
|
|
|||
|
KARMIEL, Israel -- An 18-year-old computer whiz gained access to a Pentagon
|
|||
|
computer and saw US military secrets in his home during the gulf war, police
|
|||
|
said friday.
|
|||
|
The hacker, identified as Deri Schriebman, was placed under house arrest
|
|||
|
Thursday after police searched his home in the northern Israeli city of
|
|||
|
Carmiel.
|
|||
|
Police have not heard from US authorities on the security aspects of the
|
|||
|
case, said Galilee Region Police Commander Rami Rav.
|
|||
|
"The way he cracked the Pentagon computer should certainly interest them. He
|
|||
|
was able to look at classified material during the gulf war, especially at one
|
|||
|
very sensitive project which is also connected to Israel," Rav told Reuters.
|
|||
|
Schriebman, already a graduate of Israel's Technion University, also built
|
|||
|
equipment to place international telephone calls free of charge, bypassing the
|
|||
|
computers of Israel's telephone company.
|
|||
|
Police said he also obtained the names of holders of Visa cards, passing the
|
|||
|
information to other computer "hackers" in North America, who were arrested
|
|||
|
after yearlong buying sprees.
|
|||
|
Police are investigating the case and have not yet said whether they will
|
|||
|
press charges. But Rav said the youth did not benefit from the Visa fraud.
|
|||
|
"Everything he did was out of curiousity...he made no profit from it, neither
|
|||
|
from the Visa cards nor from the sensitive security information."
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Subject: CIA dumps on the National Security Archive
|
|||
|
|
|||
|
The National Security Archive (NSA), a non-profit clearinghouse for Freedom of
|
|||
|
Information Act (FOIA) materials, requested from the Central Intelligence
|
|||
|
Agency (CIA) a list of materials that the CIA had released under the FOIA. The
|
|||
|
CIA responded to the request by producing "a random dump", 5000-pages long
|
|||
|
summarizing the released material. The NSA and the CIA are frequently at odds
|
|||
|
with each other, hence the "hostile" reply by the CIA. Under the FOIA,
|
|||
|
agencies are not required to create (i.e. organize, sort, or merge) data,
|
|||
|
merely to provide information that already exists. So, it is unlikely that the
|
|||
|
NSA would have any recourse other than to attempt to reconstruct the index from
|
|||
|
the info-garbage it was given. [Common Cause 17(4): 20 (1991)]
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Subject: CAA grant Cat IIIB autoland clearance for 747/76
|
|||
|
|
|||
|
In the September 19th Rolling Stone at page 67 an article titled "Samurai
|
|||
|
Hackers" by Lynda Edwards tells us that a: "new breed of hacker has been
|
|||
|
finding a niche in the corporate world in the last two years. These hackers
|
|||
|
are hired by white-collar professionals at ad agencies, law firms, newspapers,
|
|||
|
and investment houses who want to steal co-workers' ideas and clients or
|
|||
|
pillage supervisors computer files for marketing strategies, performance
|
|||
|
evaluations and managerial gossip."
|
|||
|
|
|||
|
Ms. Edwards presents several tales of crackers hired by unethical people in
|
|||
|
business to snoop in or sabotage other peoples' computer files. She also
|
|||
|
describes how victims sometimes hire their own crackers to mount a
|
|||
|
counter-attack. The crackers use their knowledge and skills to ferret out
|
|||
|
information from companies' networks and minicomputers. They usually receive a
|
|||
|
leg up from their employers, who get them modem 'phone numbers and basic
|
|||
|
account/password info. The crackers then overcome or bypass the often trivial
|
|||
|
security on the target systems. Most of what they do could be done by any
|
|||
|
jackleg expert with a given system, but the crackers are the agents of computer
|
|||
|
Ms. Edwards presents several tales of crackers hired by unethical people in
|
|||
|
business to snoop in or sabotage other peoples' computer files. She also
|
|||
|
describes how victims sometimes hire their own crackers to mount a
|
|||
|
counter-attack. The crackers use their knowledge and skills to ferret out
|
|||
|
information from companies' networks and minicomputers. They usually receive a
|
|||
|
leg up from their employers, who get them modem 'phone numbers and basic
|
|||
|
account/password info. The crackers then overcome or bypass the often trivial
|
|||
|
security on the target systems. Most of what they do could be done by any
|
|||
|
jackleg expert with a given system, but the crackers are the agents of computer
|
|||
|
illiterates and thus constitute a threat unconsidered by the managers of
|
|||
|
systems in non-computer businesses.
|
|||
|
|
|||
|
These crackers are seen to be somewhat akin to the wandering samurai of Japan's
|
|||
|
past. They work as mercenaries, honing their own skills and testing them in
|
|||
|
combat on behalf of employers they often hold in contempt. (The crackers are
|
|||
|
said to refer to ignorant computer users as "Stupids.") The samurai image is
|
|||
|
distorted and romanticized but the jobs the crackers take on are very real.
|
|||
|
|
|||
|
These crackers are well paid by those who hire them through bulletin boards or
|
|||
|
by word-of-mouth. Tales of their exploits circulate on BBS's and they are
|
|||
|
getting some notice in 2600 magazine.
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Subject: Computer Security Breach at Rocky Flats Nuclear Weapons Plant
|
|||
|
Date: September 16, 1991
|
|||
|
|
|||
|
AP writer Steven K. Paulson reports on 9/16/91 that security lapses at the
|
|||
|
Rocky Flats nuclear weapons plant included the storage of top-secret bomb
|
|||
|
designs for a week on a VAX accessible from the public phone network. In other
|
|||
|
instances, workers transferred classified working materials from secure
|
|||
|
computers to lower security ones, including PCs, because they were tired of
|
|||
|
constant changes in the secure systems and wanted to work on familiar [stable?]
|
|||
|
systems.
|
|||
|
|
|||
|
Head of DOE operations at Rocky Flats Bob Nelson said that the agency started
|
|||
|
last year a $37M program to correct security problems, following the
|
|||
|
recommendations of outside security experts.
|
|||
|
|
|||
|
Nelson also said that the unclassified VAX was used by employees working from
|
|||
|
home, but that if someone tries to break in ``bells and whistles go off'' [is
|
|||
|
he so sure???]
|
|||
|
|
|||
|
According to other documents obtained by the AP, other DOE computers had been
|
|||
|
found to be vulnerable to break-ins.
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
|
|||
|
Subject: Denver Hacker Hacks NASA
|
|||
|
Source: The Denver Post, Denver & The West section p. 1
|
|||
|
Date: 9/25/91
|
|||
|
|
|||
|
NASA vs. hobbyist: Computer whiz accused of illegal access, mischief
|
|||
|
By. Peter G. Chronis Denver Post staff writer
|
|||
|
|
|||
|
An Aurora computer hobbyist who allegedly used a personal computer and his home
|
|||
|
phone to penetrate NASA computers hacked off Uncle Sam enough to be indicted on
|
|||
|
seven federal counts yesterday.
|
|||
|
|
|||
|
Richard G. Wittman, 24, the alleged "hacker," was accused of two felonies,
|
|||
|
including gaining unauthorized access to NASA computers to alter, damage, or
|
|||
|
destroy information, and five misdemeanor counts of interfering with the
|
|||
|
government's operation of the computers.
|
|||
|
|
|||
|
Wittman allegedly got into the NASA system on March 7, June 11, June 19, June
|
|||
|
28, July 25, July 30, and Aug. 2, 1990.
|
|||
|
|
|||
|
Bob Pence, FBI chief in Denver, said Wittman used a personal computer in his
|
|||
|
home and gained access to the NASA systems over telephone lines.
|
|||
|
|
|||
|
The investigation, which took more than a year, concluded that Wittman accessed
|
|||
|
the NASA computer system and agency computers at the Marshall Space flight
|
|||
|
Center in Huntsville, Ala., and the Goddard Space Flight Center in Greenbelt,
|
|||
|
Md.
|
|||
|
|
|||
|
The NASA computers are linked to a system called Telenet, which allows
|
|||
|
qualified people to access government data bases. A user name and password are
|
|||
|
required to reach the NASA computers.
|
|||
|
|
|||
|
Federal sources declined to reveal more information because the complex case
|
|||
|
involves "sensitive material."
|
|||
|
|
|||
|
Wittman, a high-school graduate, apparently hadn't worked in the computer
|
|||
|
industry and held a series of odd jobs.
|
|||
|
|
|||
|
The felony counts against him each carry a possible five-year prison term and
|
|||
|
$250,000 fine.
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Source: NewsBytes
|
|||
|
|
|||
|
According to a news release from {NewsByte}, direct international
|
|||
|
dialing is now available from Moscow from 0000-0900 each day.
|
|||
|
|
|||
|
Local analysts say the reason for the start of direct-dial service is
|
|||
|
that a second international phone exchange, originally scheduled to
|
|||
|
start six months ago, has finally been launched.
|
|||
|
|
|||
|
To dial international numbers from Moscow, one must dial 8, then wait
|
|||
|
for a second dial tone, dial 10 + country code + city code + phone
|
|||
|
number.
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Subject: Company Dares Computer Intruders to Hack Away
|
|||
|
Source: The Detroit News, Sunday, Aug. 4, p. 3A
|
|||
|
|
|||
|
|
|||
|
It's a little like inviting robbers to knock over your bank.
|
|||
|
|
|||
|
To prove its computer programs are secure from electronic intruders,
|
|||
|
Unix System Laboratories wants hackers to try to break in.
|
|||
|
|
|||
|
The company set up an unattended test computer at its headquarters in
|
|||
|
Summit, N.J., and bets that unauthorized users can't get into its mock
|
|||
|
payroll accounts, can't cut phony checks and can't breach private
|
|||
|
files.
|
|||
|
|
|||
|
Initially, the challenge was issued to corporate security experts--and
|
|||
|
none has been able to sneak in during the past few months, said
|
|||
|
spokesman D. Scott Belin. Now, in a bold publicity stunt, the company
|
|||
|
will offer a toll-free phone number to let any whiz kid or mischief
|
|||
|
maker log onto a computer and hack away.
|
|||
|
|
|||
|
"There's probably 10,000 computer hackers out there," Belin said.
|
|||
|
"We're trying to figure out a way tohandle all the phone calls once we
|
|||
|
make the number available."
|
|||
|
|
|||
|
He said the company, which makes a computer operating system widely
|
|||
|
used by phone companies, has yet to decide how to publicize the
|
|||
|
toll-free access number.
|
|||
|
|
|||
|
Marilyn Partel, an operating systems manager at the company, said the
|
|||
|
software has been redesigned so that no one--even if authorized--has
|
|||
|
unlimited access to the system.
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Subject: Looking for Sundevil Victims
|
|||
|
|
|||
|
Contact: Craig Neidorf and David Sobel
|
|||
|
(Computer Professionals for Social Responsibility)
|
|||
|
|
|||
|
Computer Professionals for Social Responsibility (CPSR) is pursuing a
|
|||
|
lawsuit against the Secret Service seeking the release of information
|
|||
|
concerning Operation Sun Devil. In recently filed court papers, the
|
|||
|
agency claims that the information cannot be disclosed because, among
|
|||
|
other reasons, disclosure would violate the privacy of those
|
|||
|
individuals who are the targets of the investigation. This argument
|
|||
|
can be overcome if CPSR obtains signed releases from those
|
|||
|
individuals. CPSR is requesting the cooperation of anyone who was the
|
|||
|
subject of a Sun Devil raid on or about May 7, 1990. We are prepared
|
|||
|
to enter into an attorney-client relationship with individuals
|
|||
|
responding to this request, so that confidentiality will be assured.
|
|||
|
|
|||
|
Please respond ASAP to:
|
|||
|
|
|||
|
David Sobel
|
|||
|
CPSR Legal Counsel
|
|||
|
(202) 544-9240
|
|||
|
dsobel@washofc.cpsr.org
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Source: NewsBytes
|
|||
|
Date: October 1, 1991
|
|||
|
|
|||
|
|
|||
|
JEFFERSON VALLEY, NEW YORK, U.S.A., 1991 OCT 1 (NB) -- Cyberpunk
|
|||
|
co-author Katie Hafner, in an interview with Newsbytes, has responded
|
|||
|
to allegations of fabrication raised by Kevin Mitnick, one of the main
|
|||
|
subjects of the book.
|
|||
|
|
|||
|
Cyberpunk: Outlaws and Hackers on the Computer Frontier (Katie Hafner
|
|||
|
and John Markoff; Simon & Schuster, 1991 - $22.95) devotes the first
|
|||
|
section of the book called "Kevin: The Dark Side Hacker" to the
|
|||
|
activities of Mitnick and his associates, Lenny DiCicco, "Susan
|
|||
|
Thunder" and "Roscoe" (the last two names are pseudonyms; the persons
|
|||
|
would be interviewed only under the protection of anonymity). Mitnick,
|
|||
|
who served a prison term related to his intrusions into Digital
|
|||
|
Equipment Corporation's systems, says in a letter to the Summer 1991
|
|||
|
issue of 2600: The Hacker Quarterly that the section concerning him
|
|||
|
"is 20% fabricated and libelous."
|
|||
|
|
|||
|
Mitnick, in the letter, suggests that the authors had motivation for
|
|||
|
the alleged unfairness. He said "It seems that the authors acted with
|
|||
|
malice to cause me harm after my refusal to cooperate. Interestingly,
|
|||
|
I did offer to participate as a factual information source if I was
|
|||
|
compensated for my time, but the authors refused, claiming it would
|
|||
|
taint my objectivity. So, consequently, I declined to cooperate."
|
|||
|
|
|||
|
Hafner confirmed that Mitnick had refused cooperation after his offer
|
|||
|
to meet for pay was rejected but denied that his action caused any
|
|||
|
malicious or unfair behavior. She said "I feel that the payment of
|
|||
|
interview subjects is completely unethical and I have never been
|
|||
|
involved in such a thing and did not intend to start then. We
|
|||
|
mentioned in the book that Kevin had refused to cooperate but did not
|
|||
|
reveal that he had asked for payment. Since he has not brought the
|
|||
|
subject up, both in a call to the Tom Snyder radio show when I was on
|
|||
|
and in the 2600 letter, I will confirm the fact that his
|
|||
|
non-cooperation was due to our refusal to pay."
|
|||
|
|
|||
|
Hafner continued "Mitnick's lack of cooperation certainly did not lead
|
|||
|
to any malice or bias directed toward him. Everything in the book is,
|
|||
|
to the best of my knowledge, factual and we did everything possible to
|
|||
|
insure its accuracy. We attempted to get a confirming source for
|
|||
|
everything we were told and interviewed dozens of persons for the Dark
|
|||
|
Hacker section alone."
|
|||
|
|
|||
|
'Kevin's lack of cooperation did make the job more difficult and, may
|
|||
|
have possibly hurt him. If he had been willing to talk, he would have
|
|||
|
had an opportunity to respond to other people's statements about him
|
|||
|
but, even though we sent him numerous "return receipt" and overnight
|
|||
|
letters asking him to meet with us, he refused. Two cases in point: in
|
|||
|
the 2600 letter, he says that we described him as always eating in a
|
|||
|
computer room while talking on the telephone to Bonnie, his future
|
|||
|
wife. He denies this and says that I was trying to 'paint an unsavory
|
|||
|
picture'. It was Bonnie who told us that he was always eating while he
|
|||
|
was talking -- we didn't make it up -- and without the ability to
|
|||
|
speak to him, we had to choose to go on."
|
|||
|
|
|||
|
Hafner went on: "The second example is his statement that we said that
|
|||
|
he taunted USC's Mark Brown when, in fact, he 'never spoke with Mark
|
|||
|
Brown'. Brown says that he has definitely spoken to Mitnick and that he
|
|||
|
remembers the calls well and can call to mind details from them. If we
|
|||
|
had spoken to Mitnick, he would have had a chance to dispute such
|
|||
|
statements.
|
|||
|
|
|||
|
In response to Mitnick's object to the authors' changing of items that
|
|||
|
would possibly identify DiCicco as an unemployment cheat, Hafner said
|
|||
|
"That was my call. We tried to protect identities wherever it was
|
|||
|
desired. Lenny asked us to change the name and we did just as we
|
|||
|
also used public aliases for 'Roscoe' and 'Susan Thunder' at their
|
|||
|
request. Contrary to Kevin's statement, Lenny has not been travelling
|
|||
|
around with us promoting the book and has received no benefit from it
|
|||
|
other than the ability to tell his story as he understands it."
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Subject: Phone Gall
|
|||
|
Source: InformationWeek, pp.12-13
|
|||
|
(By Mary E. Thyfault with Diane Medina and Bob Violino)
|
|||
|
Date: August 26, 1991
|
|||
|
|
|||
|
AT&T has sued nearly 20 of its large business users for refusing to pay
|
|||
|
for calls made by hackers through their corporate telephone In recent
|
|||
|
months, the question of whether businesses victimized by phone hackers
|
|||
|
should be forced to pay for such calls has stirred acrimonious debate
|
|||
|
and prompted numerous actions before the Federal Communications
|
|||
|
Commission. Estimates of the corporate monies lost annually to phone
|
|||
|
hackers begin at $500 million and go into the billions.
|
|||
|
|
|||
|
Now an InformationWeek investigation reveals a broad effort by AT&T to
|
|||
|
shift this debate to the courts. Among the corporations AT&T has quietly
|
|||
|
sued are Avis Rent-A-Car System Inc., FMC Corp., Citgo Petroleum Corp.,
|
|||
|
Procter & Gamble Co., and Perkin-Elmer Corp. (see below). In the largest
|
|||
|
such lawsuit uncovered by IW, the United Nations was the victim of
|
|||
|
nearly $1 million in unauthorized calls.
|
|||
|
|
|||
|
While the existence of these lawsuits remains unknown to most large
|
|||
|
users, AT&T has been playing legal hardball with corporate customers for
|
|||
|
at least a year, in most cases collecting fees in confidential,
|
|||
|
out-of-court settlements. It appears no case has yet reached the trial
|
|||
|
stage.
|
|||
|
|
|||
|
The fact that users back down is no surprise; AT&T is a $36.11 billion
|
|||
|
behemoth with a crack legal staff. The mere threat of a lawsuit is
|
|||
|
enough to force most firms to pull out their checkbooks.
|
|||
|
|
|||
|
"Who can afford to go to court with the phone company?" asks Roger
|
|||
|
Longtin, counsel for electronics component distributor Avnet Inc. in
|
|||
|
Great Neck, N.Y. , which is currently negotiating with AT&T over nearly
|
|||
|
$1 million in disputed charges.
|
|||
|
|
|||
|
AT&T's long-distance rivals MCI Communications Corp. and US Sprint
|
|||
|
Communications Co. say they have not sued any users over this issue, and
|
|||
|
IW could find no evidence of any legal actions. Such a suit, explains a
|
|||
|
spokesman for MCI, "is a good way to lose a customer".
|
|||
|
|
|||
|
One analyst argues, however, that MCI and Sprint can't afford to be nice
|
|||
|
guys much longer. "I'd be surprised if MCI and Sprint didn't file suits
|
|||
|
- uncollectibles have been a horrendous problem in the long-distance
|
|||
|
business," says John Bain, senior VP at Raymond James & Associates Inc.
|
|||
|
in St. Petersburg, Fla. One lawyer who has represented corporate victims
|
|||
|
of toll fraud says the out-of-court settlements always involve some
|
|||
|
payments by customers. AT&T typically starts negotiations by knocking
|
|||
|
15% off the user's bill, he says; that's about the break-even point for
|
|||
|
AT&T's profit on long-distance calls, according to analysts. AT&T does
|
|||
|
not discuss litigation, a spokesman says.
|
|||
|
|
|||
|
Some customers are enraged at AT&T and the telecom industry over this
|
|||
|
issue. They argue that the carriers and PBX vendors are not providing
|
|||
|
enough warning, training, or support. "The carriers should do away with
|
|||
|
the attitude of 'The customer should've known,'" charges Tim Honaker CFO
|
|||
|
for Dearborn Financial Publishing lnc. in Chicago, which has been hacked
|
|||
|
for $65,000. The telcom suppliers "come in with these great technologies
|
|||
|
and then say, 'By the way, you gotta figure out how to manage this thing
|
|||
|
on your own.' Well, we're not in that business." Suppliers should at
|
|||
|
least share in the responsibility and liability for phone fraud charges,
|
|||
|
according to victims.
|
|||
|
|
|||
|
Vendors respond that telecom managers can virtually end fraud by
|
|||
|
properly managing their phone systems, particularly remote access
|
|||
|
features. Some users agree. Says Jay Silverberg, president of the
|
|||
|
National Rolm Users Group, "Although from a technical perspective the
|
|||
|
vendor has the responsibility to provide the ability to make a system
|
|||
|
secure, it's the user's responsibility to manage it."
|
|||
|
|
|||
|
The software to monitor such systems isn't cheap, however-about $120,000
|
|||
|
on average-and "it can only cut down the hemorrhaging, not eliminate
|
|||
|
hacking," says James Ross of Ross Engineering Inc., a software
|
|||
|
engineering firm in Sterling, Va. Most victims argue that carriers have
|
|||
|
the technology to detect hacking at their fingertips.
|
|||
|
|
|||
|
While the victims' attorneys say AT&T hasn't improved its security
|
|||
|
measures, all the carriers and the major PBX vendors-Northern Telecom,
|
|||
|
Rolm Co., and the business telephone unit of AT&T-say they are putting
|
|||
|
increasing emphasis on helping users fight phone hacking. AT&T offers
|
|||
|
seminars at every user group meeting, for example, and Rolm announced in
|
|||
|
April it would begin assigning a security coordinator in each of its 31
|
|||
|
branch locations.
|
|||
|
|
|||
|
Currently, AT&T has seven fulltime staffers charged with educating
|
|||
|
customers and investigating fraud cases. Users claim that number is
|
|||
|
woefully low. (Meanwhile, the number of AT&T lawyers pursuing litigation
|
|||
|
in this area is, an AT&T spokesman admits, "probably in the tens.") AT&T
|
|||
|
has 40,000 PBX installations and 4 million business long-distance
|
|||
|
customers. "If they really want to protect the public, they need to hire
|
|||
|
more like 700 people," says Charles Helein, a Washington attorney who
|
|||
|
has represented several toll fraud victims. AT&T says it will add three
|
|||
|
more staffers next month. Some users even claim AT&T is not devoting
|
|||
|
more resources to ending toll fraud because it is making too much money
|
|||
|
on such calls-a charge AT&T vehemently denies.
|
|||
|
|
|||
|
"If you significantly cut phone fraud, you have to wonder what kind of
|
|||
|
impact it would have on their revenue," says Thomas Crowe, attorney for
|
|||
|
Chartways Technologies Inc. in Rockville, Md., which suffered $81,789 in
|
|||
|
unauthorized calls.
|
|||
|
|
|||
|
"That's ludicrous," says an AT&T spokesman. "AT&T devotes enormous
|
|||
|
resources to this." The company argues that it is doing more than
|
|||
|
required. On a weekly basis, AT&T monitors the three area codes in South
|
|||
|
America and Central America that receive the most illegal calls. When a
|
|||
|
sudden increase in volume is noted, AT&T tries to notify customers,
|
|||
|
reaching about 25%, of them before they themselves notice the break-in.
|
|||
|
|
|||
|
"I can't tell you that every week we get to everyone, but we attempt to
|
|||
|
based on our resources," says Robert Carman, head of AT&T's corporate
|
|||
|
security division. Still, the FCC says all complaints filed to date by
|
|||
|
users over this issue have involved AT&T.
|
|||
|
|
|||
|
Frank Chrz, VP of office services at ITT Consumer Financial Corp. in
|
|||
|
Minneapolis, says AT&T "was very responsive" in helping him detect and
|
|||
|
stop the hackers that penetrated his company's Rolm PBX, racking up
|
|||
|
$100,000 in charges. But that cooperation ended when the bill came due
|
|||
|
and ITT refused to pay. AT&T sued ITT, which promptly sued both Rolm and
|
|||
|
Rolm's PBX distributor. All four settled out of court. At least two
|
|||
|
other users have sued their PBX vendors after being sued by AT&T: New
|
|||
|
York City Human Resources Administration sued Northern Telecom Inc., and
|
|||
|
Western Diversified Life Insurance Co. in Deerfield, Ill., countersued
|
|||
|
AT&T as both its PBX supplier and long-distance carrier.
|
|||
|
|
|||
|
In another twist, two corporations sued AT&T before AT&T could sue them:
|
|||
|
Mitsubishi International Corp. in New York (IW, June 24,p.14) and John
|
|||
|
D. Hollingsworth On Wheels Inc. in Greenville, S.C.
|
|||
|
|
|||
|
Despite all the complex legal maneuvering, every case eventually comes
|
|||
|
down to finger-pointing. No one wants to accept responsibility for toll
|
|||
|
fraud. Until now, the FCC has typically ruled against users, but
|
|||
|
mounting corporate anger may mean the commission will impose some sort
|
|||
|
of liability ceiling. What is clear is that users and vendors will have
|
|||
|
to work together to solve the problem.
|
|||
|
|
|||
|
"In no way are we inferring we can catch everything," says Bob Fox,
|
|||
|
Sprint's assistant VP of corporate security. "The majority of the time
|
|||
|
we're getting to the customer before he knows what's going on. But we're
|
|||
|
not going to catch everything every time. It takes teamwork.
|
|||
|
|
|||
|
"The customer is going to get hurt if we do our thing but he doesn't do
|
|||
|
his, or vice versa." -Mary E. Thyfault with Diane Medina and Bob Violino
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Subject: Now It Can Be Told "Mad Hackers' Key Party" [excerpt]
|
|||
|
Source: Unknown User
|
|||
|
Date: September 30, 1991
|
|||
|
|
|||
|
Hosted by Geraldo Rivera
|
|||
|
|
|||
|
Geraldo: I'm Geraldo rivera. And now, It can be told.
|
|||
|
|
|||
|
<First part of the program includes comments and interviews with
|
|||
|
Emmanuel Goldstein, Krista Bradford, Cliff Stoll, Phiber Optik, Winn
|
|||
|
Schwartau, and other bit players. Focus of discussion is on hacking as
|
|||
|
"terrorism" and generous film and news clips of terrorism and war
|
|||
|
scenes interwoven amongst discussion of dangers of hackers to national
|
|||
|
security. We pick up the dialogue when Don Ingraham (Alameda County
|
|||
|
(Calif.) prosecutor and Craig Neidorf (former editor of PHRACK) join in>
|
|||
|
|
|||
|
Geraldo: Joining us now via satellite from Oakland, CA is the
|
|||
|
Assistant District Attorney Don Ingraham ... for Alameda County and he
|
|||
|
has been prosecuting computer hackers for years.
|
|||
|
|
|||
|
<Don is in the TV box, between Geraldo and Craig [KL]>
|
|||
|
|
|||
|
Geraldo: Don, how do you respond to the feeling common among so many
|
|||
|
hackers that what they're doing is a public service; they're exposing
|
|||
|
the flaws in our security systems?
|
|||
|
|
|||
|
Don: Right, and just like the people who rape a coed on campus are
|
|||
|
exposing the flaws in our nation's higher education security. It's
|
|||
|
absolute nonsense. They are doing nothing more than showing off to
|
|||
|
each other, and satisfying their own appetite to know something that
|
|||
|
is not theirs to know.
|
|||
|
|
|||
|
Geraldo: Don, you stand by, Craig as well. And when we come back
|
|||
|
we'll hear more from prosecutor Ingraham and from, I guess his
|
|||
|
archrival here, the Mad Hacker Craig Neidorf.
|
|||
|
|
|||
|
<Commercial>
|
|||
|
|
|||
|
Geraldo: We're back with Craig Neidorf, a former University of
|
|||
|
Missouri student who ran a widely distributed electronic newsletter
|
|||
|
for computer hackers. He is so proud of being America's
|
|||
|
Most Wanted computer hacker that he has put together this very
|
|||
|
impressive scrapbook.
|
|||
|
|
|||
|
<Geraldo holds up a colorful scrapbook..On the left page shows a
|
|||
|
lightning bolt hitting what looks to be a crown [Knight Lightning]
|
|||
|
...And on the right it looks like a graphic saying "Knight Lightning"
|
|||
|
and below that is a black circle with a white lightning bolt, and
|
|||
|
next to that is a triangle that looks very similar to the triangle
|
|||
|
with an eye that appeared on the cover of _GURPS_Cyberpunk_ [which
|
|||
|
said in it, the book that was seized by the Secret Service! see page
|
|||
|
4...- but the one on KL is illegible]>
|
|||
|
|
|||
|
Geraldo: Knight Lightning I guess that was your code?
|
|||
|
|
|||
|
KL: It was my editor handle.
|
|||
|
|
|||
|
Geraldo: That's your handle. OK. And from Oakland, CA we are
|
|||
|
talking with the Assistant District Attorney Don Ingraham, who is hard
|
|||
|
driven, you might say, to put people like Craig behind bars. Don, do
|
|||
|
you think Craig's lucky that he's not behind bars right now?
|
|||
|
|
|||
|
Don: Yes, I think he's extraordinarily lucky. He was part of a
|
|||
|
conspiracy, in my opinion, to take property that wasn't his and share
|
|||
|
it with others. They charged him with interstate transport of stolen
|
|||
|
property - couldn't make the threshold -and it came out that it had
|
|||
|
been compromised by, unfortunately, released by another Bellcore
|
|||
|
subsidiary. But was certainly not through any doing of HIS that he is
|
|||
|
a free man.
|
|||
|
|
|||
|
Geraldo: So you think that his activities stink, then.
|
|||
|
|
|||
|
Don: Absolutely. No Question about it.
|
|||
|
|
|||
|
Geraldo: Craig, you wanna respond? Are you doing something for the
|
|||
|
greater good of society?
|
|||
|
|
|||
|
KL: Well I was merely publishing a newsletter. I didn't go out and
|
|||
|
find this document. Rather it was sent to me. In many ways it could
|
|||
|
be compared to Daniel Ellsberg sending the Pentagon Papers to the New
|
|||
|
York Times.
|
|||
|
|
|||
|
Geraldo: Do you figure it that way Don? Is he like Daniel Ellsberg?
|
|||
|
|
|||
|
Don: No, Ellsberg went to court to deal with it. Daniel Ellsberg's
|
|||
|
release of the Pentagon Papers is the subject of a published court
|
|||
|
decision to point out it was a matter of national security and
|
|||
|
national interest. The E911 codes, which is the citizen's link to the
|
|||
|
police department are not a matter of national security. They're a
|
|||
|
matter of the central service to the community.......
|
|||
|
|
|||
|
Geraldo: You broke into the 911 system? He broke into the 911
|
|||
|
system!
|
|||
|
|
|||
|
KL: No, that's not correct. I never entered any 911 telephone
|
|||
|
system.
|
|||
|
|
|||
|
Don: I didn't say he entered into it. What I said was that he and
|
|||
|
Riggs conspired together to take a code that they knew was necessary
|
|||
|
to 911 and to take it apart to see how it worked. They never had the
|
|||
|
owner's permission, they never asked for it.
|
|||
|
|
|||
|
Geraldo: Alright, lemme ask you this....
|
|||
|
|
|||
|
KL: The court found that there was no conspiracy here.
|
|||
|
|
|||
|
Geraldo: You were acquitted. You were vindicated at least from
|
|||
|
criminal responsibility. Lemme just quickly ask you this: hackers
|
|||
|
have been inside the White House computer.
|
|||
|
|
|||
|
KL: Yes they have.
|
|||
|
|
|||
|
Geraldo: And they've been inside the Pentagon computer.
|
|||
|
|
|||
|
KL: Yes.
|
|||
|
|
|||
|
Geraldo: And if Saddam Hussein hired some hackers whether they're
|
|||
|
from Holland or any other place, he could've gotten into these
|
|||
|
computers, presumably.
|
|||
|
|
|||
|
KL: Presumably, he could've.
|
|||
|
|
|||
|
Geraldo: And gotten some valuable information.
|
|||
|
|
|||
|
KL: It's definitely possible.
|
|||
|
|
|||
|
Geraldo: And you still think hackers are performing a public service?
|
|||
|
|
|||
|
KL: That's not what I said. I think that those kind of activities
|
|||
|
are wrong. But by the same token, the teenagers, or some of the
|
|||
|
people here that are not performing malicious acts, while they should
|
|||
|
be punished should not be published as extreme as the law currently
|
|||
|
provides.
|
|||
|
|
|||
|
Geraldo: You're response to that Don?
|
|||
|
|
|||
|
Don: I don't think they're being punished very much at all. We're
|
|||
|
having trouble even taking away their gear. I don't know one of them
|
|||
|
has done hard time in a prison. The book, Hafner's book on
|
|||
|
_Cyberpunk_, points out that even Mitnick who is a real electronic
|
|||
|
Hannibal Lecter ... did not get near any of the punishment that what
|
|||
|
he was doing entitled him to.
|
|||
|
|
|||
|
Geraldo: <laughing> An electronic Hannibal Lecter. OK, stand by,
|
|||
|
we'll be back with more of this debate in a moment...
|
|||
|
|
|||
|
<commercials>
|
|||
|
|
|||
|
Geraldo: Back with Craig Neidorf and prosecutor Don Ingraham. Craig,
|
|||
|
do you think hackers are voyeurs or are they potentially terrorists?
|
|||
|
|
|||
|
KL: I think they resemble voyeurs more than terrorists. They are
|
|||
|
often times looking at places where they don't belong, but most
|
|||
|
hackers do not intend to cause any damage.
|
|||
|
|
|||
|
Geraldo: Do you buy that Don?
|
|||
|
|
|||
|
Don: If they stopped at voyeurism they would be basically
|
|||
|
sociopathic, but not doing near the harm they do now. But they don't
|
|||
|
stop at looking, that's the point. They take things out and share
|
|||
|
them with others, and they are not being accountable and being
|
|||
|
responsible as to whom they are sharing this information. That is the
|
|||
|
risk.
|
|||
|
|
|||
|
Geraldo: Can they find out my credit rating? I know that's not a
|
|||
|
national security issue, but I'm concerned about it.
|
|||
|
|
|||
|
Don: Piece of cake.
|
|||
|
|
|||
|
Geraldo: No problem.
|
|||
|
|
|||
|
Don: Assuming....
|
|||
|
|
|||
|
Geraldo: Go ahead. Assuming I have a credit rating...hahahah....
|
|||
|
|
|||
|
Don: Assume that the credit is not carried by someone who is using
|
|||
|
adequate security.
|
|||
|
|
|||
|
Geraldo: But you think Craig it's not problem.
|
|||
|
|
|||
|
KL: I think it's no problem.
|
|||
|
|
|||
|
Geraldo: Give me quickly the worst case scenario. Say Abu Nidal had
|
|||
|
you working for him.
|
|||
|
|
|||
|
KL: I'm sorry?
|
|||
|
|
|||
|
Geraldo: Abu Nidal, notorious .....
|
|||
|
|
|||
|
KL: As far as your credit rating?
|
|||
|
|
|||
|
Geraldo: No, not as far as my credit rating.. The world, national
|
|||
|
security.
|
|||
|
|
|||
|
KL: Well, hackers have gotten into computer systems owned by the
|
|||
|
government before. At this point they've never acknowledged that it
|
|||
|
was anything that was ever classified. But even some unclassified
|
|||
|
information could be used to the detriment of our country.
|
|||
|
|
|||
|
Geraldo: Like the counter-terrorist strategy on January 15th, the day
|
|||
|
of the deadline expired in the Persian Gulf.
|
|||
|
|
|||
|
KL: Perhaps if Saddam Hussein had somehow known for sure that we were
|
|||
|
going to launch an attack, it might have benefited him in some way,
|
|||
|
but I'm really not sure.
|
|||
|
|
|||
|
Geraldo: Don, worst case scenario, 30 seconds?
|
|||
|
|
|||
|
Don: They wipe out our communications system. Rather easily done.
|
|||
|
Nobody talks to anyone else, nothing moves, patients don't get their
|
|||
|
medicine. We're on our knees.
|
|||
|
|
|||
|
Geraldo: What do you think of Craig, quickly, and people like him?
|
|||
|
|
|||
|
Don: What do I think of Craig? I have a lot of respect for Craig, I
|
|||
|
think he's probably going to be an outstanding lawyer someday. But he
|
|||
|
is contributing to a disease, and a lack of understanding ethically,
|
|||
|
that is causing a lot of trouble.
|
|||
|
|
|||
|
Geraldo: One word answer. As the computer proliferate won't hackers
|
|||
|
also proliferate? Won't there be more and more people like you to
|
|||
|
deal with?
|
|||
|
|
|||
|
Knight Lightning: I think we're seeing a new breed of hacker. And
|
|||
|
some of them will be malicious.
|
|||
|
|
|||
|
Geraldo: Some of them will be malicious. Yes, well, that's it...for
|
|||
|
now. I'm Geraldo Rivera.
|
|||
|
|
|||
|
[End of Program]
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Subject: 2600 Magazine Exposes Security Holes
|
|||
|
Source: NewsBytes
|
|||
|
Date: October 18, 1991
|
|||
|
|
|||
|
2600 Magazine Exposes Security Holes 10/18/91
|
|||
|
ARMONK, NEW YORK, U.S.A., 1991 OCT 18 (NB) -- Supported by videotape
|
|||
|
examples, Emmanuel Goldstein, editor and publisher of 2600 Magazine:
|
|||
|
The Hacker Quarterly, told those in attendance at an October 17th New
|
|||
|
York City press conference that "the American public is often lulled
|
|||
|
into a false sense of security; a security that is often not supported
|
|||
|
by the facts of specific cases."
|
|||
|
|
|||
|
The videotapes, produced by 2600 and provided to the press show both
|
|||
|
the intrusion of a Dutch "hacker" in to United States Military
|
|||
|
computers and what Goldstein alleges is the fallability of a brand of
|
|||
|
mechanical, pushbutton locks used by, among others, New York State
|
|||
|
University sites, Federal Express, United Parcel Service, JFK
|
|||
|
International Airport, IBM and NASA.
|
|||
|
|
|||
|
Goldstein told Newsbytes "We invested considerable time and money to
|
|||
|
wake people up to the fact that we have a false sense of security when
|
|||
|
it comes not only to computer networks but to physical safety as
|
|||
|
well."
|
|||
|
|
|||
|
The tape of the Dutch "hacker" was made by Goldstein while in Europe.
|
|||
|
and shows the intrusion into a Unites States Army computer system. The
|
|||
|
intruder was able to set up a fictitious account called "danquayle"
|
|||
|
and, once into the system, was able to obtain "root" privileges thus
|
|||
|
giving him total control of the workings of the system.
|
|||
|
|
|||
|
A portion of this tape had previously been shown with Goldstein's
|
|||
|
approval on an episode of the Gerald Rivera television show "Now It
|
|||
|
Can Be Told". Goldstein told Newsbytes that one reason for his release
|
|||
|
of the entire tape to the press was his feeling that the Rivera
|
|||
|
episode entitled "The Mad Hacker's Key Party" had distorted the
|
|||
|
message of the tape - "This was not a case of a terrorist break-in but
|
|||
|
was rather simply a demonstration of the lack of security of our
|
|||
|
systems. To find root accounts with password like "Kuwait" and lack of
|
|||
|
sophisticated security in our military computers should be of real
|
|||
|
concern and should not be lost in an explotation of the 'hacker'
|
|||
|
issue."
|
|||
|
|
|||
|
A background paper provided at the conference by 2600 explains the
|
|||
|
entire intrusion effort in detail and states "The purpose of this
|
|||
|
demonstration is to show just how easy it really was. Great care was
|
|||
|
taken to ensure that no damage or alteration of data occurred on this
|
|||
|
particular system. No military secrets were taken and no files were
|
|||
|
saved to a disk by the hackers. What is frightening is that nobody
|
|||
|
knows who else has access to this information or what their
|
|||
|
motivations might be. This is a warning that cannot be taken lightly."
|
|||
|
|
|||
|
The second videotape show Goldstein and other 2600 staff opening
|
|||
|
seemingly at will locks manufactured by Simplex Security Systems. The
|
|||
|
locks of the mechanical pushbutton combination variety were shown to
|
|||
|
be installed at the State of New York University at Stony Brook, JFK
|
|||
|
International Airport and on Federal Express and United Parcel pick-up
|
|||
|
boxes throughout the New York Metropolitan area.
|
|||
|
|
|||
|
In the film, Goldstein is shown filling out a Federal Express envelope
|
|||
|
for delivery to 2600 Magazine and inserting in the Fedex dropbox. He
|
|||
|
then lifts the weather protection cover on the box's lock and keys a
|
|||
|
combination that allows him to open the lock and remove his envelope.
|
|||
|
Scott Skinner, a SUNY student and 2600 staff member told Newsbytes
|
|||
|
that it had actually taken the staff 10 minutes to determine the
|
|||
|
proper code combinations to open the lock.
|
|||
|
|
|||
|
Skinner explained, "While Simplex prefers people to think that there
|
|||
|
is an endless number of permutations to the lock, there are actually
|
|||
|
only 1,085. In most cases, even this number is greatly reduced -- if
|
|||
|
one knows that only three buttons are being used, it reduces the
|
|||
|
possibilities to 135. Additionally, we found that, once we had the
|
|||
|
combination to one Federal Express dropbox, it worked in every other
|
|||
|
one that we tried in the New York area."
|
|||
|
|
|||
|
Goldstein told Newsbytes "When we contacted Simplex, they first denied
|
|||
|
that the locks were unsafe and then said that the permutations were
|
|||
|
much greater. After some discussion, they admitted that the 1,085
|
|||
|
figure was correct but said that it would take a person with a
|
|||
|
complete listing of the combinations over four hours to try them all.
|
|||
|
Our experience obviously shows that they may be opened in a much
|
|||
|
shorter time than that."
|
|||
|
|
|||
|
Goldstein also pointed out that, "although a $5 Master combination
|
|||
|
lock may be broken by a crowbar, it is a much more secure combination
|
|||
|
device. It has 64,000 combinations compared to the 1,085 with the
|
|||
|
Simplex."
|
|||
|
|
|||
|
Goldstein continued, "One of the real problems is that, should a
|
|||
|
person have the misfortune to be robbed, entry due to a failure of the
|
|||
|
Simplex lock gives no evidence of a forcible break-in and police and
|
|||
|
insurance companies often put the blame on the homeowner or office
|
|||
|
manager for 'giving away the combination.' It really can create a
|
|||
|
problem."
|
|||
|
|
|||
|
Skinner told Newsbytes "I'm really concerned about this. I'm a student
|
|||
|
at SUNY, Stony Brook and all our dormitories use these locks as the
|
|||
|
only means of security. I've shown the problem to Scott Law who is
|
|||
|
responsible for residence security but he has discounted the problem
|
|||
|
and said that the locks were installed at the recommendation of the
|
|||
|
campus locksmith. The locksmith, Garry Lenox contradicts Law and says
|
|||
|
that he recommended against these locks years ago and said that they
|
|||
|
were not secure for dormitory use." Skinner said that he will write an
|
|||
|
article for the college newspaper in an attempt to raise consciousness
|
|||
|
about this problem.
|
|||
|
|
|||
|
Goldstein also said that he intends to publish the list of valid
|
|||
|
combinations in an up-coming issue of 2600 to demonstrate to the
|
|||
|
public the problems with the lock. He further said that he will raise
|
|||
|
the issue on his weekly radio show, "Off The Hook", heard on New
|
|||
|
York's WBAI-FM.
|
|||
|
|
|||
|
In response to a Newsbytes question concerning how the 2600 staff
|
|||
|
happened to become involved in a problem with locks, Goldstein said,
|
|||
|
"We're hackers and when we see something with buttons on it, whether
|
|||
|
it's a computer or not, we tend to try it. While the average person
|
|||
|
tends to accept that things are secure just because he is told that
|
|||
|
they are, hackers will usually try them out. It's because of this
|
|||
|
'trying out' that we can point out the problems with both the US
|
|||
|
military computer security and this lock -- and we feel that, in both
|
|||
|
cases, we have performed a service. People should be aware when they
|
|||
|
are at risk so that they may take action to correct it."
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Subject: CRIME IN CYBERSPACE session
|
|||
|
Source: Jim Thomas (CuD)
|
|||
|
Date: November 20, 1991
|
|||
|
|
|||
|
The CuD moderators, Mike Godwin of the Electronic Frontier Foundation,
|
|||
|
and several other prominent scholars will participate in a panel on
|
|||
|
"CRIME IN CYBERSPACE" at the American Criminological Society annual
|
|||
|
meetings in San Francisco on Friday, November 22. Their session will
|
|||
|
be in the Yorkshire Room of the St. Francis hotel from 1:15 to 2:45.
|
|||
|
|
|||
|
The complete session:
|
|||
|
|
|||
|
Chair: Gordon Meyer: Co-editor Computer underground Digest
|
|||
|
|
|||
|
Mike Godwin (Staff Attorney, Electronic Frontier Foundation):
|
|||
|
"Criminal law and the computer youth culture"
|
|||
|
|
|||
|
Richard C. Hollinger (University of Florida):
|
|||
|
"Hackers, Crackers, and Pirates: Rethinking Social Control"
|
|||
|
|
|||
|
Lee Tien (University of California, Berkeley):
|
|||
|
"Folk Notions of Property & Privacy in the Information Society"
|
|||
|
|
|||
|
Jim Thomas (Northern Illinois University):
|
|||
|
"From Disk to Discourse: The Images of Techno-Evil"
|
|||
|
|
|||
|
Gary T. Marx (Department of Urban Studies and Planning): Discussant
|
|||
|
|
|||
|
Albrecht Funk (University of Hamburg): Discussant
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Subject: Cracker charged in Australia
|
|||
|
Date: August 13, 1991
|
|||
|
|
|||
|
The AP (8/13/91) reports from Melbourne that Nahshon Even-Chaim, a 20-year old
|
|||
|
computer science student, is being charged in Melbourne's Magistrates' Court on
|
|||
|
charges of gaining unauthorized access to one of CSIRO's (Australia's
|
|||
|
government research institute) computers, and 47 counts of misusing Australia's
|
|||
|
Telecom phone system for unauthorized access to computers at various US
|
|||
|
institutions, including universities, NASA, Lawrence Livermore Labs, and
|
|||
|
Execucom Systems Corp. of Austin, Texas, where it is alleged he destroyed
|
|||
|
important files, including the only inventory of the company's assets. The
|
|||
|
prosecution says that the police recorded phone conversations in which
|
|||
|
Even-Chaim described some of his activities. No plea has been entered yet in
|
|||
|
the ongoing pre-trial proceedings.
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
PHONE COMPANIES COULD TRANSMIT TV UNDER FCC PLAN
|
|||
|
-- Blow to Cable Industry
|
|||
|
-- Viewers Expected to Benefit From Many More Choices - New Lines Needed"
|
|||
|
Source: Edmund L. Andrews in {The New York Times}
|
|||
|
Date: October 25, 1991 at A1.
|
|||
|
|
|||
|
In a surprising and controversial move to promote cable television
|
|||
|
competition, the Federal Communications Commission proposed today that
|
|||
|
local telephone companies be allowed to package and transmit
|
|||
|
television programming.
|
|||
|
|
|||
|
The proposed rules, which were unanimously endorsed and are likely
|
|||
|
to be adopted within a year, would expose cable companies to the most
|
|||
|
threatening competition yet. But they could benefit cable television
|
|||
|
consumers, many of whom have seen their bills double and triple in
|
|||
|
recent years.
|
|||
|
|
|||
|
The cable industry vowed to fight the proposals and threatened to
|
|||
|
challenge the rules in court if they are adopted. Telephone
|
|||
|
companies, eager to enter a lucrative new business, applauded.
|
|||
|
|
|||
|
MORE CHOICES' FOR VIEWERS
|
|||
|
|
|||
|
"Today's action will create competition and offer consumers more
|
|||
|
choices," said James R. Young, vice-president of regulatory and
|
|||
|
industry relations at the Bell Atlantic Corporation. "Let's hope it's
|
|||
|
a beginning to the end of turf wars."
|
|||
|
|
|||
|
In essence, the commission recommended that telephone companies be
|
|||
|
allowed to offer "video dial tone" over telephone lines that would
|
|||
|
carry programming produced by outside companies. Consumers could view
|
|||
|
whatever programs they pleased and would be charged accordingly.
|
|||
|
|
|||
|
Initially, telephone companies would serve promarily as a
|
|||
|
pipeline, not producing the programs. But the commission said
|
|||
|
telephone companies should also be allowed to organize and package
|
|||
|
video services, as long as they make their networks available to all
|
|||
|
programmers. The commission also opened an inquiry on whether to let
|
|||
|
telephone companies produce programs.
|
|||
|
|
|||
|
CONGRESS HAS AVOIDED ISSUE
|
|||
|
|
|||
|
The idea of allowing so-called video dial tone service has long
|
|||
|
been a favorite of the F.C.C.'s chairman, Alfred C. Sikes. Congress,
|
|||
|
which is weighing regulatory legislation to rein in cable proces has
|
|||
|
shied away from the issue. Today's action makes it more likely that
|
|||
|
lawmakers will have to reconsider the role of telephone companies in
|
|||
|
television.
|
|||
|
|
|||
|
Before cable companies would feel much impact from today's F.C.C.
|
|||
|
proposal, however, most telephone companies would have to spend
|
|||
|
billions of dollars to install new fiber-optic transmission lines and
|
|||
|
switching equipment that could carry large volumes of television
|
|||
|
material. Analysts have estimated that the cost of converting every
|
|||
|
home in the country to a fiber-optic line would be $100 billion to
|
|||
|
$200 billion and that it would take at least five years.
|
|||
|
|
|||
|
Most large telephone companies, including all of the regional Bell
|
|||
|
companies, already plan to replace their copper wires with fiber over
|
|||
|
the next two decades. The immense business opportunity posed by the
|
|||
|
$18 billion cable television market is likely to accelerate those
|
|||
|
plans.
|
|||
|
|
|||
|
High-capacity communications lines that reach every home in
|
|||
|
America could radically alter the distribution of entertainment and
|
|||
|
enable people on home computers to tap distant libraries and obtain
|
|||
|
information in seconds.
|
|||
|
|
|||
|
"Both program providers and consumers would have chances they
|
|||
|
don't have today, without the bottlenecks provided by cable companies
|
|||
|
and without the bottlenecks of broadcasting," said Richard Firestone,
|
|||
|
chief of the F.C.C.'s common carrier bureau.
|
|||
|
|
|||
|
The move was immediately attacked by the National Cable Television
|
|||
|
Association, which threatened to challenge any new rules in court.
|
|||
|
|
|||
|
"Until and unless the telco's monopoly in voice telephone is
|
|||
|
ended, no level of Government safeguards against cross-subsidies will
|
|||
|
be effective," said James P. Mahoney, president of the cable
|
|||
|
association.
|
|||
|
|
|||
|
QUESTION OF TV PRODUCTION
|
|||
|
|
|||
|
The most controversial issue, which the F.C.C. raised for
|
|||
|
discussion without recommendation, is whether telephone companies
|
|||
|
should be allowed to produce programming, a much bigger business than
|
|||
|
transmission. Many Bush Administration officials favor such a move,
|
|||
|
but television boradcasters and producers bitterly oppose it.
|
|||
|
Officials noted that such a shift would require changes in the Cable
|
|||
|
Television Act of 1984.
|
|||
|
|
|||
|
"Among the top two or three concerns of ever cable operator has
|
|||
|
always been head-to-head competition against local telephone
|
|||
|
companies," said John Mansell, a senior analyst at Paul Kagan
|
|||
|
Associates, a marketing-research firm that monitors the cable
|
|||
|
industry.
|
|||
|
|
|||
|
For telephone companies, the move could be a windfall. Steven R.
|
|||
|
Sieck, vice president of Link Resources Inc., a market-research firm
|
|||
|
in New York, said, "It's by far the largest market opportunity among
|
|||
|
the whole collection of information services" for telephone companies.
|
|||
|
|
|||
|
It remains unclear, however, whether the new rules will survive in
|
|||
|
court. Teh Cable Television Act of 1984 bars a telephone company from
|
|||
|
owning a cable television franchise in the same market. The F.C.C.
|
|||
|
ruled today, however, that the law does not prevent a local telephone
|
|||
|
company from transmitting programs produced by other companies and
|
|||
|
that it does not bar long-distance carriers in any way.
|
|||
|
|
|||
|
The Bell companies have lobbied strongly for legislation that
|
|||
|
would allow them to enter the cable business, and several companies
|
|||
|
have invested in European cable franchises. In addition, Pacific
|
|||
|
Telesis Group, which provides local phone service in California,
|
|||
|
already holds an option to buy a controlling interest in a Chicago
|
|||
|
cable franchise, which could be [sic] permissible since it is outside
|
|||
|
the company's telephone area.
|
|||
|
|
|||
|
RULING ON FRANCHISE FEES
|
|||
|
|
|||
|
The commission also handed down a ruling that could give telephone
|
|||
|
companies an important price advantage in future competition with
|
|||
|
cable operators and could prompt protests from local governments,
|
|||
|
ruling that neither a telephone company nor a video programmer needs
|
|||
|
to pay franchise fees to local governments.
|
|||
|
|
|||
|
Under the cable act, by contrast, local governments can charge
|
|||
|
cable operators a franchise fee as high as five per cent of revenues.
|
|||
|
|
|||
|
Explaining today's ruling, Mr. Sikes said, "We have segregation
|
|||
|
laws, and these segregation laws should be ended." He added that some
|
|||
|
cable companies were already installing optical fibers in their own
|
|||
|
networks, and that some were exploring the option of using their
|
|||
|
netowrks to offer telephone service.
|
|||
|
|
|||
|
The proposals mark the second major change in longstanding
|
|||
|
restrictions on the telephone companies' ability to move into new
|
|||
|
services. Less than three weeks ago, a Federa appeals court cleared
|
|||
|
the way for the regional Bell companies to begin providing information
|
|||
|
services, like news, stock and sports tables, immediately.
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Source: Bell Labs News
|
|||
|
Date: October 28th, 1991
|
|||
|
|
|||
|
These New Jersey Bell technicians are actually in the process of
|
|||
|
taking a very well-behaved -- and the nation's oldest -- 1ESS(tm) out
|
|||
|
of service. The switch became the world's first commercial electronic
|
|||
|
switching system when it was installed in Succasunna, NJ in 1965. It
|
|||
|
was replaced with a 5ESS(tm) on September 28th.
|
|||
|
|
|||
|
The cutover was accomplished in three steps. First, the new
|
|||
|
5ESS was installed and hooked up to the incoming lines -- which were
|
|||
|
also still going to the old switch -- but not powered up. Then, at
|
|||
|
1:00 AM, when there is relatively little traffic on the old switch,
|
|||
|
the cables coming in to the 1ESS were quickly cut. Once all the lines
|
|||
|
were cut, the new switch was turned on. The whole operation took only
|
|||
|
a few minutes, and agencies involved in emergency services were
|
|||
|
notified in advance of the brief service outage.
|
|||
|
|
|||
|
The 1ESS design project, which was conducted at Whippany in the
|
|||
|
early 60's, was the largest single development effort undertaken by
|
|||
|
the Bell System up to that point, occupying more than 300 engineers
|
|||
|
and technicians.
|
|||
|
|
|||
|
AT&T Network Systems and New Jersey Bell are considering
|
|||
|
donating part of the retired switch to the Smithsonian Institution.
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Subject: Computer Saboteur Pleads Guilty
|
|||
|
Source: Wire service report in the `Los Angeles Times', 5 Nov. '91, p. D2
|
|||
|
Date: Wed, 6 Nov 1991
|
|||
|
|
|||
|
|
|||
|
Computer Saboteur Pleads Guilty: Michael John Lauffenburger, 31, a former
|
|||
|
General Dynamics computer programmer who planted a destructive `logic bomb' in
|
|||
|
one of the San Diego defense contractor's mainframe computers, pleaded guilty
|
|||
|
to one count of attempted computer tampering. He faces up to one year in
|
|||
|
prison and a fine of $100,000.
|
|||
|
|
|||
|
Federal prosecutors said Lauffenburger had hoped to increase his salary by
|
|||
|
creating a problem only he could solve: a program that was designed to destroy
|
|||
|
a database of Atlas Rocket components. He set the program to activate, then
|
|||
|
resigned, hoping, investigators say, that the company would rehire him as a
|
|||
|
highly paid consultant once it discovered the damage. But another General
|
|||
|
Dynamics programmer inadvertently ran across the program and alerted security,
|
|||
|
which disarmed the program.
|
|||
|
|
|||
|
Bellcore has just announced a new edition of its Specification of
|
|||
|
Signalling System Number 7 (issue 2). The notice that came my way in
|
|||
|
the mail had a list price of USD$550, document number TR-NWT-000246.
|
|||
|
Covered are such things as Message Transfer Part (MTP), Singalling
|
|||
|
Connection Control Part (SCCP), ISDN User Part (ISUP), Transaction
|
|||
|
Capabilities Application Part (TCAP), Operation, Maintenance and
|
|||
|
Administration Part (OMAP) and Interworking of ISDN Access and Network
|
|||
|
Signaling.
|
|||
|
|
|||
|
SS7 is a protocol that provides signalling within a telephone network;
|
|||
|
the idea is that signalling is done on a common channel, away from the
|
|||
|
voice circuits, in order to improve security and efficiency of
|
|||
|
connections. Practical examples of the network include the Caller
|
|||
|
Number ID service (SS7 delivers the caller's number to the called
|
|||
|
party) or the almost instantaneous call completion after Toronto-area
|
|||
|
subscribers dial the last digit on most local phone calls.
|
|||
|
|
|||
|
I do not represent Bellcore; I'm just one who gets mailings from them.
|
|||
|
For more information, contact 1 800 521.CORE (USA) or +1 908 699.5800
|
|||
|
(other), or check the FAQ for more info (mail address, Bellcore's
|
|||
|
activities).
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Sent by: Erik Bloodaxe
|
|||
|
|
|||
|
"LEGION OF DOOM--INTERNET WORLD TOUR" T-SHIRTS!
|
|||
|
|
|||
|
Now you too can own an official Legion of Doom T-shirt. This
|
|||
|
is the same shirt that sold-out rapidly at the "Cyberview"
|
|||
|
hackers conference in St. Louis. Join the other proud owners
|
|||
|
such as Lotus founder Mitch Kapor and award-winning author Bruce
|
|||
|
Sterling by adding this collector's item to your wardrobe. This
|
|||
|
professionally made, 100 percent cotton shirt is printed on both
|
|||
|
front and back. The front displays "Legion of Doom Internet World
|
|||
|
Tour" as well as a sword and telephone intersecting the planet
|
|||
|
earth, skull-and-crossbones style. The back displays the
|
|||
|
words "Hacking for Jesus" as well as a substantial list of "tour-stops"
|
|||
|
(internet sites) and a quote from Aleister Crowley. This T-shirt is sold
|
|||
|
only as a novelty item, and is in no way attempting to glorify computer
|
|||
|
crime.
|
|||
|
|
|||
|
Shirts are only $15.00, postage included! Overseas add an
|
|||
|
additional $5.00. Send check or money-order (No CODs, cash or
|
|||
|
credit cards--even if it's really your card) made payable to
|
|||
|
Chris Goggans to:
|
|||
|
|
|||
|
Chris Goggans
|
|||
|
5300 N. Braeswood #4
|
|||
|
Suite 181
|
|||
|
Houston, TX 77096
|
|||
|
|
|||
|
[Editor's Note: I have one, and for any collector this is an item that
|
|||
|
is insurpassable -- JD]
|
|||
|
|
|||
|
=============================================================================
|
|||
|
|
|||
|
/ /
|
|||
|
/ NIA073 / File 07 /
|
|||
|
/ Hacking the HP3000 /
|
|||
|
/ Malefactor /
|
|||
|
/ /
|
|||
|
|
|||
|
PRELUDE
|
|||
|
^^^^^^^
|
|||
|
|
|||
|
The HP3000 operating system MPE is a very intricate and varied system.
|
|||
|
So varied is MPE that two systems running the same version of the OS
|
|||
|
will reveal startling differances. This file will be a general overview of MPE,
|
|||
|
|
|||
|
not a guide to any particular version. The two primary types of MPE
|
|||
|
systems you will encounter are MPE and MPE XL. The difference between these
|
|||
|
versions of MPE will be specifically indicated within this file, due to
|
|||
|
the frequent occurance of such differances.
|
|||
|
|
|||
|
Identifying an HP3000
|
|||
|
^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
HP3000's can be recognized quite easily. Primarily, two prompts can
|
|||
|
be obtained when first calling an HP3000...
|
|||
|
|
|||
|
:
|
|||
|
|
|||
|
or
|
|||
|
|
|||
|
MPE XL:
|
|||
|
|
|||
|
Another simple method of identifying an HP3000 is the error message
|
|||
|
i.e.
|
|||
|
|
|||
|
EXPECTED [SESSION NAME,] USER.ACCT [,GROUP] (CIERR 1424)
|
|||
|
|
|||
|
Although the error message may vary, (CIERR XXXX) is relatively consistent.
|
|||
|
|
|||
|
Now once into an hp there can be 3 passwords per login, but there usually arn't
|
|||
|
any. Within the hp system, many default accounts exist; if there are
|
|||
|
none, however, the hp printouts contain everything you need to get in. This is
|
|||
|
where trashing definately pays off. Here is a listing of a few defaults/common
|
|||
|
accounts.
|
|||
|
|
|||
|
======================
|
|||
|
Hacking into an HP3000
|
|||
|
======================
|
|||
|
|
|||
|
The HP3000 has numerous defaults/common accounts that are there I will
|
|||
|
briefly list a few of them:
|
|||
|
|
|||
|
MGR.TELESUP (Has SM privelege)
|
|||
|
OPERATOR.SYS (Has SM privelege)
|
|||
|
FIELD.SUPPORT (Has SM privelege)
|
|||
|
MANAGER.SYS (Has SM privelege)
|
|||
|
MGR/MANAGER.HPOFFICE
|
|||
|
MGR/MANAGER.HPWORD
|
|||
|
MGR/MANAGER.ITF3000
|
|||
|
MGR/MANAGER.SUPPORT
|
|||
|
MGR/MANAGER.SECURITY
|
|||
|
MGR/MANAGER.ROBELLE
|
|||
|
MGR/MANAGER.COGNOS
|
|||
|
MGR/MANAGER.TELAMON
|
|||
|
MGR/MANAGER.NETBASE
|
|||
|
MGR/MANAGER.VESOFT
|
|||
|
MGR/MANAGER.RJE
|
|||
|
MGR/MANAGER.HPMAIL
|
|||
|
MGR/MANAGER.FINANCE
|
|||
|
MGR/MANAGER.HP4DEMO
|
|||
|
MGR/MANAGER.HPPL85
|
|||
|
MGR/MANAGER.HPPL87
|
|||
|
MGR/MANAGER.HPPL89
|
|||
|
MGR/MANAGER.ADMIN
|
|||
|
MGR/MANAGER.ACCOUNT
|
|||
|
MGR/MANAGER.PROD
|
|||
|
MGR/MANAGER.DISC
|
|||
|
MGR/MANAGER.TAXES
|
|||
|
MGR/MANAGER.CONV
|
|||
|
MGR/MANAGER.XLSERVER
|
|||
|
MGR/MANAGER.LIBRARY
|
|||
|
MGR/MANAGER.USER
|
|||
|
MGR/MANAGER.PATCH
|
|||
|
MGR/MANAGER.CALENDAR
|
|||
|
MGR/MANAGER.REGO
|
|||
|
MGR/MANAGER.VESOFT
|
|||
|
MGR/MANAGER.TOOLS
|
|||
|
|
|||
|
|
|||
|
There will always be a MGR or MANAGER user under every account. Because
|
|||
|
when an account is created on an HP3000 a user must be created to manage
|
|||
|
that account; thus, you have the manager or mgr. Almost always the user will
|
|||
|
be mgr.account, but occasionally manager is used. Only two accounts,
|
|||
|
manager.security and manager.itf3000, usually do not appear as mgr.
|
|||
|
|
|||
|
Common Passwords and Password Explanation
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
There are two types of passwords primarily encountered on the HP3000.
|
|||
|
First and most common is staight MPE passwords which are entered at
|
|||
|
login. The second and more sinister are the Security 3000 passwords,
|
|||
|
which are entered after login. Mainly, you will encounter MPE password
|
|||
|
protection; however some system admins do utilize Security 3000 passwords.
|
|||
|
Security 3000 passwords will be discussed at greater length later within
|
|||
|
this file; I will now turn my attention to MPE passwords.
|
|||
|
|
|||
|
MPE Passwording Scheme and Account Structure
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
The MPE passwording scheme works on all aspects of the login and can be
|
|||
|
entered in two ways examples...
|
|||
|
|
|||
|
Example 1
|
|||
|
^^^^^^^^^
|
|||
|
:HELLO OPERATOR.SYS,PUB
|
|||
|
|
|||
|
ENTER ACCOUNT PASSWORD:CASPER
|
|||
|
|
|||
|
ENTER USER PASSWORD:EMERALD
|
|||
|
|
|||
|
Example 2
|
|||
|
^^^^^^^^^
|
|||
|
|
|||
|
:HELLO OPERATOR/EMERALD.SYS/CASPER, PUB
|
|||
|
|
|||
|
The latter of these two methods is best, because it will allow multiple
|
|||
|
failures on different accounts while the first will disconnect after
|
|||
|
multiple invalid attempts on one account.
|
|||
|
|
|||
|
Account Structure
|
|||
|
^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
The account structure is split into four groups and is formatted thusly;
|
|||
|
|
|||
|
Sessionsname,Username.AccountName,Groupname
|
|||
|
|
|||
|
The session name and group name can be omitted for logon in most cases.
|
|||
|
If, however a message at account login states, "NO HOME GROUP FOR
|
|||
|
USER...", a group name then must be specified for that account. The
|
|||
|
default groupname is:
|
|||
|
|
|||
|
PUB
|
|||
|
|
|||
|
Logging into an HP3000
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
|
|||
|
HELLO
|
|||
|
[SESSIONNAME,]USERNAME[/USERPASS].ACCTNAME[/ACCTPASS][,GROUPNAME[/GROUPPASS]]
|
|||
|
|
|||
|
for example
|
|||
|
|
|||
|
HELLO LOSERS, FIELD.SUPPORT/SUSAN,PUB/SECRET
|
|||
|
|
|||
|
The above would log you into session LOSERS under the user FIELD and
|
|||
|
account SUPPORT with password SUSAN under the group PUB with password SECRET.
|
|||
|
Although this appears difficult, it is merely a formal example. In reality
|
|||
|
users are never passworded; the same goes for accounts. The only part of
|
|||
|
the HP that ever seems to be passworded is groups; and no group password
|
|||
|
is needed to get in, since there are many ways around it.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
To logon to an HP3000, logon in the following manner:
|
|||
|
|
|||
|
HELLO USERNAME.ACCTNAME,GROUPNAME
|
|||
|
|
|||
|
To hack the operators account, type:
|
|||
|
|
|||
|
HELLO OPERATOR.SYS,PUB
|
|||
|
|
|||
|
HELLO is the command on the HP3000 that begins an interactive session.
|
|||
|
|
|||
|
Occasionally the HP3000 will appear to be slow or pause and break
|
|||
|
repeatedly; select a terminal type to remedy this situation. The
|
|||
|
primary terminal types are 9, 10, and 18. A finer point under the MPE XL
|
|||
|
operating system only 10 and 18 apply unless other terminal types have been
|
|||
|
established with the Workstation Configurator Utility (This is not important
|
|||
|
just trivial). To hasten the process, logon similiarly:
|
|||
|
|
|||
|
HELLO OPERATOR.SYS,PUB;TERM=9
|
|||
|
|
|||
|
|
|||
|
HP3000 Defaults Passwords and Common Passwords
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
The following is a list of the primary defaults and common account
|
|||
|
passwords.
|
|||
|
|
|||
|
Most Common and Default Passwords
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
HPONLY (Almost always Telesup account Password)
|
|||
|
ONLYHP
|
|||
|
NEW
|
|||
|
HPUSER
|
|||
|
PASS
|
|||
|
PASSWORD
|
|||
|
|
|||
|
Here is a secondary list of passwords. Mainly on the HP3000 you will find
|
|||
|
names to be the most common password.
|
|||
|
|
|||
|
Secondary Password List
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
$MONEY 123ABC ABC123 ADMIN AGNES ALYCE AMY APASS
|
|||
|
ASDF BARBAR BEER BELL BETTY BILL BOB BRUCE
|
|||
|
BRUTE
|
|||
|
BUDGET BUG BURDEN CARL CAROL CARROT CARTER CENTER
|
|||
|
CHARLIE CHICK CINDI CNTL COKE CONDOM CONNIE CONTROL
|
|||
|
CORRECT COW DATAPAC DAVE DAVID DEANNE DIAG DOC
|
|||
|
DON DONNA DONOR DOS EAST ELAINE ELISA ELLYCE
|
|||
|
ENTRY FALCON FIELD FUN FUZZ GENE GINA GLENN
|
|||
|
GONE GRAPHICS GREG GUIDED HAND HAROLD HEALTH HERMIT
|
|||
|
HOLD HOT HOTSTUFF INSIGHT JACKIE JENNI JOGGING JOHN
|
|||
|
JUDY KATHY KELLY KITTY LARRY LESLIE LINDA LISA
|
|||
|
LITTLE LOIS LOUISE LOVE MAESTRO MARCIA MARY MARY
|
|||
|
MIKE MODEM MONEY MYRTLE NELSON NET NETWORK NEW
|
|||
|
NORTH PAGAN PASS01 PATT PEPSI PETER PHIL PROD
|
|||
|
QUASAR QUEST QWERTY REMOTE RESULT ROLLO RUBBER RUNNING
|
|||
|
SAFE SAFESEX SAFETY SAILING SALLY SAM SANDY SCOTT
|
|||
|
SEA SECRET SECURITY SOUP SOUTH STEER STEVE TAPES
|
|||
|
TEACH TECH TELENET TEMP TEST TEST1 THISTL TODD
|
|||
|
TOOTIE TOOTSIE TOUR TYMNET USER USERPASS VICTOR VIVIAN
|
|||
|
WASH WAVE WEST WIDGET XYZ
|
|||
|
|
|||
|
==============================================
|
|||
|
Manipulating, Utilizing, and Raping the HP3000
|
|||
|
==============================================
|
|||
|
|
|||
|
There are 5 things to do once you are inside your HP3000 to ensure
|
|||
|
continued access and prosperity. The canonistic approach to take is:
|
|||
|
|
|||
|
Five Points of Interest
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
Check to See Who is on the System
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
To check who is the HP3000, simply type:
|
|||
|
|
|||
|
SHOWJOB
|
|||
|
|
|||
|
Pulling NUA's of Systems Networked with your HP3000
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
To pull the NUA's of the systems your HP3000 is networked with, type:
|
|||
|
|
|||
|
RUN NETCONF.PUB.SYS
|
|||
|
|
|||
|
After running this program, type list and a list of NUA's and parameters
|
|||
|
will appear.
|
|||
|
|
|||
|
Grabbing the Password File
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
To grab the entire password file, turn on the buffer and type:
|
|||
|
|
|||
|
LISTUSER @.@
|
|||
|
|
|||
|
This will list all of the users and passwords, there accounts they are
|
|||
|
under, and the accounts password. On MPE XL OS
|
|||
|
you will have to issue a...
|
|||
|
|
|||
|
LISTUSER @.@ ;PASS
|
|||
|
|
|||
|
Check for Telamon Software
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
To check for Telamon Software do this:
|
|||
|
|
|||
|
LISTF @.@.TELAMON,1
|
|||
|
|
|||
|
An error or a listing will be released if Telamon Software is on
|
|||
|
the system. Telamon is networking software that allows HP3000's to dialout
|
|||
|
via the nets to; Dow Jones, Compuserve, Dialog, Easylink, etc... By looking
|
|||
|
through the Telamon files NUI and passwords to these systems can be
|
|||
|
obtained. The passwords are usually stored in easily recognizable files
|
|||
|
(i.e. EASYPW would be thier EASYLINK password.) NUI's they can usually be
|
|||
|
pulled out of AUTODIAL.
|
|||
|
|
|||
|
Creating an Account and User and Account/User Parameters
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
The next step to do is create an account and user ID for yourself;
|
|||
|
according to the following command.
|
|||
|
|
|||
|
NEWACCT HACK,MALEF;PASS=MALEF;CAP=SM,AM,AL,GL,DI,OP,NA,NM,SF,ND,UV,CV,CS,PS,
|
|||
|
LG,PH,DS,MR,PM <C/R>
|
|||
|
|
|||
|
Explanation of above...
|
|||
|
|
|||
|
NEWACCT = Command to create account
|
|||
|
HACK = Accountname
|
|||
|
MALEF = Manager of the account HACK
|
|||
|
PASS=MALEF = Sets the account password to RBOCR
|
|||
|
; = Parameters Separator
|
|||
|
CAP=Whatever = This is the capabilities listing of the account see
|
|||
|
chart below.
|
|||
|
|
|||
|
Capabilities Listing
|
|||
|
-=-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
System Manager = SM
|
|||
|
Account Manager = AM
|
|||
|
Account Librarian = AL
|
|||
|
Group Librarian = GL
|
|||
|
Diagnostician = DI
|
|||
|
System Supervisor = OP
|
|||
|
Network Administrator = NA
|
|||
|
Node Manager = NM
|
|||
|
Save Files = SF
|
|||
|
Access to Nonshareable I/O Devices = ND
|
|||
|
Use Volumes = UV
|
|||
|
Create Volumes = CV
|
|||
|
Use Communication Subsystem = CS
|
|||
|
Programmatic Sessions = PS
|
|||
|
User Logging = LG
|
|||
|
Process Handling = PH
|
|||
|
Extra Data Segments = DS
|
|||
|
Multiple RINs = MR
|
|||
|
Priveleged Mode = PM
|
|||
|
Interactive Access = IA
|
|||
|
Batch Access = BA
|
|||
|
|
|||
|
One last task remains type;
|
|||
|
|
|||
|
ALTUSER MALEF.HACK;HOME=PUB;PASS=RBOCR;CAP=SM,AM,etc...
|
|||
|
|
|||
|
Explanation of above:
|
|||
|
|
|||
|
ALTUSER = Command to modify user
|
|||
|
MALEF = Username to be modified
|
|||
|
HACK = Account that user is in
|
|||
|
HOME=PUB = Sets users home group to pub
|
|||
|
PASS=RBOCR = This sets users password to RBOCR
|
|||
|
CAP=SM,AM... = This is the Capabilities of the User
|
|||
|
; = Parameters Seperator
|
|||
|
|
|||
|
The capabilities listings for both the user and the account are
|
|||
|
identical. Briefly mentioned here are a few more commands.
|
|||
|
|
|||
|
NEWUSER (Creates New user) 1
|
|||
|
|
|||
|
ALTUSER (Modifies User) 1
|
|||
|
PURGEUSER (Deletes User) 1
|
|||
|
|
|||
|
NEWACCT (Creates New Account) 2
|
|||
|
ALTACCT (Modifies Account) 3
|
|||
|
PURGEACCT (Deletes Account) 3
|
|||
|
|
|||
|
NEWGROUP (Creates New group) 4
|
|||
|
ALTGROUP (Modifies Group) 4
|
|||
|
PURGEGROUP (Deletes Group) 4
|
|||
|
|
|||
|
All of these commands with the exception of the purge command work in
|
|||
|
the same fashion. Here is a general algorithm for their use with the numbers
|
|||
|
corresponding to the operation:
|
|||
|
|
|||
|
COMMAND USER.ACCT/ACCT,USER/ACCT/GROUP.ACCT;PARMS;PARMS;PARMS
|
|||
|
1 2 3 4
|
|||
|
|
|||
|
The only other exception that is of concern is the difference between
|
|||
|
user + account capabilities and group capabilities. The group capabilities
|
|||
|
are differant and below follows a list.
|
|||
|
|
|||
|
Group Capabilities
|
|||
|
-=-=-=-=-=-=-=-=-=
|
|||
|
|
|||
|
Process Handling = PH
|
|||
|
Extra Data Segments = DS
|
|||
|
Multiple RN's = MR
|
|||
|
Priveleged Mode = PM
|
|||
|
Interactive Access = IA
|
|||
|
Batch Access = BA
|
|||
|
|
|||
|
It is neccessary to be cognizant of the fact rules regarding accounts, users,
|
|||
|
and groups. A User's capabilities cannot exceed the accounts capabilities for
|
|||
|
example a user cannot have SM privelege if the account doesn't have SM
|
|||
|
privelege, the same applies to groups. A group cannot have PM privelege
|
|||
|
if the account doesn't have PM privelege. However, just because an account has
|
|||
|
SM privelege doesn't mean a user automatically gets SM privelege and the same
|
|||
|
goes for groups.
|
|||
|
|
|||
|
|
|||
|
User Defined Commands (UDC's)
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
User defined commands are self-explanatory, and are user defined commands.
|
|||
|
These commands are stored in catalogs throughout the system. An HP3000
|
|||
|
may have multiple catalogs each with different commands. To list the commands
|
|||
|
type:
|
|||
|
|
|||
|
SHOWCATALOG
|
|||
|
|
|||
|
This will print out a listing of commands for furthur information on a
|
|||
|
particular command type:
|
|||
|
|
|||
|
HELP command
|
|||
|
|
|||
|
To execute a particular command, type the command's name. i.e.
|
|||
|
|
|||
|
SJ
|
|||
|
|
|||
|
(Note: SJ is a commonly found UDC that is showjob just shortened to SJ)
|
|||
|
|
|||
|
UDC's can be found under almost any account on the HP3000 and are usually
|
|||
|
named XXXUDC or SYSUDC or UDC1 etc... To peruse other UDC files that may
|
|||
|
have nice commands you can add them to your existing catalog like so...
|
|||
|
|
|||
|
SETCATALOG SYSUDC.PUB.SYS;APPEND
|
|||
|
|
|||
|
Explanaiton of above:
|
|||
|
|
|||
|
SYSUDC = The UDC file
|
|||
|
PUB = The group the UDC file is located in
|
|||
|
SYS = The account the UDC file is located in
|
|||
|
; = Parameter Separator
|
|||
|
APPEND = Adds UDC file to existing UDC file w/o overwriting it
|
|||
|
|
|||
|
However this only works on MPE XL and not MPE to add another catalog
|
|||
|
on MPE you will have to type:
|
|||
|
|
|||
|
SETCATALOG SYSUDC.PUB.SYS
|
|||
|
|
|||
|
There isn't much of a differance to complain of, but always remember
|
|||
|
to reset the catalog to what it formally was before you began fucking
|
|||
|
with it. I cannot stress this fact enough if the legitemate user notices
|
|||
|
a differant UDC catalog (which he will unless he is ray charles) then the
|
|||
|
system will be alerted to intrusion.
|
|||
|
|
|||
|
UDC can also have lockwords these are stored in command.pub.sys and
|
|||
|
can be pulled from there or are in a listf @.group.account,-2 or a listf
|
|||
|
@.group.account,-3 depending on the MPE version you are under.
|
|||
|
|
|||
|
Creating UDC's is very simple go to the editor and follow the
|
|||
|
format...
|
|||
|
|
|||
|
SJ
|
|||
|
showjob
|
|||
|
***
|
|||
|
|
|||
|
That is the format for the showjob command. This is how UDC files are
|
|||
|
created simply the UDC command;MPE command;***. There are a few minimal
|
|||
|
parameters to take into account and options. Today we will deal only
|
|||
|
with the options.
|
|||
|
|
|||
|
LOGIN - Command executes at login
|
|||
|
NOLOGIN - Standard format doesn't execute at login (default)
|
|||
|
HELP - Help for udc (default)
|
|||
|
NOHELP - This won't give help for UDC
|
|||
|
BREAK - Can break out of command (default)
|
|||
|
NOBREAK - Can't break out of command
|
|||
|
LIST - Error reporting with ^
|
|||
|
NOLIST - No error reporting (default)
|
|||
|
|
|||
|
SJ
|
|||
|
OPTION LOGIN
|
|||
|
SHOWJOB
|
|||
|
****
|
|||
|
|
|||
|
What follows now is a standard UDC file I use slightly modified for
|
|||
|
general public use, but still nonetheless useful. Here is how to do it and
|
|||
|
set it word for word. This is basically a unix command crossover for
|
|||
|
HP3000.
|
|||
|
|
|||
|
SETCATALOG
|
|||
|
|
|||
|
EDITOR
|
|||
|
|
|||
|
/A
|
|||
|
sj
|
|||
|
option login
|
|||
|
showjob
|
|||
|
***
|
|||
|
who
|
|||
|
showjob
|
|||
|
***
|
|||
|
rm
|
|||
|
purge
|
|||
|
***
|
|||
|
ls
|
|||
|
listf
|
|||
|
***
|
|||
|
cd
|
|||
|
chgroup
|
|||
|
***
|
|||
|
cp
|
|||
|
fcopy
|
|||
|
***
|
|||
|
date
|
|||
|
showtime
|
|||
|
***
|
|||
|
time
|
|||
|
showtime
|
|||
|
***
|
|||
|
wall
|
|||
|
warn
|
|||
|
***
|
|||
|
write
|
|||
|
tell
|
|||
|
***
|
|||
|
deluser
|
|||
|
purgeuser
|
|||
|
***
|
|||
|
chmod
|
|||
|
altsec
|
|||
|
***
|
|||
|
//
|
|||
|
|
|||
|
/K MALEUDC
|
|||
|
|
|||
|
EXIT
|
|||
|
|
|||
|
SETCATALOG MALEUDC
|
|||
|
|
|||
|
Now your done.
|
|||
|
|
|||
|
Files, Directories, and Parameters
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
I will begin this section with two listings of file codes with both the
|
|||
|
Integer value and the Mnemonic. These are charts to be used for referance and
|
|||
|
will come in handy.
|
|||
|
|
|||
|
File Codes for MPE
|
|||
|
^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
Integer Mnemonic Meaning
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
1024 USL User Subprogram Library
|
|||
|
1025 BASD BASIC Data
|
|||
|
1026 BASP BASIC Program
|
|||
|
1027 BASFP BASIC Fast Program
|
|||
|
1028 RL Relocatable Library
|
|||
|
1029 PROG Program file
|
|||
|
1030 NMPRG Native Mode Program file
|
|||
|
1031 SL Segmented Library
|
|||
|
1032 NMSL Native Mode Executable Library file
|
|||
|
1033 NMRL Native Mode Relocatable Library file
|
|||
|
1035 VFORM View Form file
|
|||
|
1036 VFAST View Fast Forms file
|
|||
|
1037 VREF View Reformat file
|
|||
|
1040 XLSAV Cross Loader ASCII file (SAVE)
|
|||
|
1041 XLBIN Cross Loader Relocated Binary file
|
|||
|
1042 XLDSP Cross Loader ASCII file (DISPLAY)
|
|||
|
1050 EDITQ Edit Quick file
|
|||
|
1051 EDTCQ Edit KEEPQ file (COBOL)
|
|||
|
1052 EDTCT Edit TEXT file (COBOL)
|
|||
|
1054 TDPDT TDP Diary file
|
|||
|
1055 TDPQM TDP Proof Marked QMARKED
|
|||
|
1056 TDPP TDP Proof marked non-COBOL file
|
|||
|
1057 TDPCP TDP Proof Marked COBOL file
|
|||
|
1058 TDPQ TDP Workfile
|
|||
|
1059 TDPXQ TDP Workfile (COBOL)
|
|||
|
1060 RJEPN RJE Punch file
|
|||
|
1070 QPROC QUERY Procedure file
|
|||
|
1080 KSAMK KSAM Key file
|
|||
|
1083 GRAPH GRAPH Specification file
|
|||
|
1084 SD Self-describing file
|
|||
|
1090 LOG User Logging logfile
|
|||
|
1100 WDOC HPWORD Document
|
|||
|
1101 WDICT HPWORD Hyphenation dictionary
|
|||
|
1102 WCONF HPWORD Configuration file
|
|||
|
1103 W2601 HPWORD Attended Printer Environment
|
|||
|
1110 PCELL IFS/3000 Character Cell file
|
|||
|
1111 PFORM IFS/3000 Form file
|
|||
|
1112 PENV IFS/3000 Environment file
|
|||
|
1113 PCCMP IFS/3000 Compiled Character Cell file
|
|||
|
1114 RASTR Graphics Image in RASTR Format
|
|||
|
1130 OPTLF OPT/3000 logfile
|
|||
|
1131 TEPES TEPE/3000 Script file
|
|||
|
1132 TEPEL TEPE/3000 logfile
|
|||
|
1133 SAMPL APS/3000 logfile
|
|||
|
1139 MPEDL MPEDCP/DRP logfile
|
|||
|
1140 TSR HPToolset Root file
|
|||
|
1141 TSD HPToolset Data file
|
|||
|
1145 DRAW Drawing File for HPDRAW
|
|||
|
1146 FIG Figure File for HPDRAW
|
|||
|
1147 FONT Reserved
|
|||
|
1148 COLOR Reserved
|
|||
|
1149 D48 Reserved
|
|||
|
1152 SLATE Compressed SLATE file
|
|||
|
1153 SLATW Expanded SLATE workfile
|
|||
|
1156 DSTOR Store file for RAPID/3000 Utility DICTDBU
|
|||
|
1157 TCODE Code file for Transact/3000 Compiler
|
|||
|
1158 RCODE Code file for Report/3000 Compiler
|
|||
|
1159 ICODE Code file for Inform/3000 Compiler
|
|||
|
1166 MDIST HPDESK Distribution list
|
|||
|
1167 MTEXT HPDESK Text
|
|||
|
1168 MARPA ARPA Message file
|
|||
|
1169 MARPD ARPA Distribution list
|
|||
|
1170 MCMND HPDESK Abbreviated Commands file
|
|||
|
1171 MFRTM Reserved
|
|||
|
1172 Reserved
|
|||
|
1173 MEFT Reserved
|
|||
|
1174 MCRPT Reserved
|
|||
|
1175 MSERL Reserved
|
|||
|
1176 UCSF Reserved
|
|||
|
1177 TTYPE Term Type file
|
|||
|
1178 TVFC Term Vertical Format Control file
|
|||
|
1192 NCONF Network Configuration file
|
|||
|
1193 NTRAC Network Trace file
|
|||
|
1194 NLOG Network logfile
|
|||
|
1195 MIDAS Reserved
|
|||
|
1211 ANODE Reserved
|
|||
|
1212 INODE Reserved
|
|||
|
1213 INVRT Reserved
|
|||
|
1214 EXCEP Reserved
|
|||
|
1215 TAXON Reserved
|
|||
|
1216 QUERF Reserved
|
|||
|
1217 DOCDR Reserved
|
|||
|
1226 VC VC file
|
|||
|
1227 DIF DIF file
|
|||
|
1228 LANGD Language Definition file
|
|||
|
1229 CHARD Character Set Definition File
|
|||
|
1230 MGCAT Formatted Application Message Catalog
|
|||
|
1236 BMAP Reserved
|
|||
|
1242 BDATA Basic Data file
|
|||
|
1243 BFORM Basic Field Order File for VPLUS
|
|||
|
1244 BSAVE Basic Saved Program file
|
|||
|
1245 BCNFG Config. File for Default Option Basic Program
|
|||
|
1246 BKEY Function Key Definition file
|
|||
|
1258 PFSTA Pathflow STATIC file
|
|||
|
1259 PFDYN Pathflow DYNAMIC file
|
|||
|
1270 RTDCA Revisable Form DCA Document*
|
|||
|
1271 FFDCA Document Interchange Unit file HPWORD/150
|
|||
|
1272 DIU DISOSS Filing Information file
|
|||
|
1273 PDOC Search Result Information file
|
|||
|
1275 DFI Reserved
|
|||
|
1276 SRI HPMAP/3000 Map Specification file
|
|||
|
1401 CWPTX Reserved
|
|||
|
1421 MAP Reserved
|
|||
|
1422 GAL HPBRW Dictionary file
|
|||
|
1425 TTX HPBRW Specification file
|
|||
|
1428 RDIC HPBRW Specification file (frozen)
|
|||
|
1429 RSPEC HPBRW Execution file
|
|||
|
1430 RSPCF HPBRW Report Job file
|
|||
|
1431 REXEC HPBRW Intermediate Report file
|
|||
|
1432 RJOB HPBRW Dictionary Output file
|
|||
|
1433 ROUTI HPBRW Print file
|
|||
|
1434 ROUTD HPBRW Configuration file
|
|||
|
1435 PRINT Reserved
|
|||
|
1436 RCONF Native Mode Object file
|
|||
|
1441 PIF PASCAL Source Library
|
|||
|
1461 NMOBJ Reserved
|
|||
|
1462 PASLB PASCAL Source Library
|
|||
|
3333 Reserved
|
|||
|
|
|||
|
|
|||
|
File Codes for MPE XL
|
|||
|
^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
Integer Mnemonic Meaning
|
|||
|
------------------------------------------------------------------------
|
|||
|
1024 USL User Subprogram Library
|
|||
|
1025 BASD Basic Data
|
|||
|
1026 BASP Basic Program
|
|||
|
1027 BASFP Basic Fast Program
|
|||
|
1028 RL Compatibility Mode Relocatable Library
|
|||
|
1029 PROG Compatibility Mode Program File
|
|||
|
1030 NMPROG Native Mode Program File
|
|||
|
1031 SL Segmented Library
|
|||
|
1032 NMXL Native Mode Executable Library
|
|||
|
1033 NMRL Native Mode Relocatable Library
|
|||
|
1035 VFORM VPLUS Forms File
|
|||
|
1036 VFAST VPLUS Fast Forms File
|
|||
|
1037 VREF VPLUS Reformat File
|
|||
|
1040 XLSAV Cross Loader ASCII File (SAVE)
|
|||
|
1041 XLBIN Cross Loader Relocated Binary File
|
|||
|
1042 XLDSP Cross Loader ASCII File (DISPLAY)
|
|||
|
1050 EDITQ Edit Quick File
|
|||
|
1051 EDTCQ Edit KEEPQ File (COBOL)
|
|||
|
1052 EDTCT Edit TEXT File (COBOL)
|
|||
|
1054 TDPDT TDP Diary File
|
|||
|
1055 TDPQM TDP Proof Marked QMARKED
|
|||
|
1056 TDPP TDP Proof Marked non-COBOL File
|
|||
|
1057 TDPCP TDP Proof Marked COBOL File
|
|||
|
1058 TDPQ TDP Work File
|
|||
|
1059 TDPXQ TDP Work File (COBOL)
|
|||
|
1060 RJEPN RJE Punch File
|
|||
|
1070 QPROC QUERY Procedure File
|
|||
|
1080 KSAMK KSAM Key File
|
|||
|
1083 GRAPH GRAPH Specification File
|
|||
|
1084 SD Self-describing File
|
|||
|
1090 LOG User Logging Log File
|
|||
|
1100 WDOC HPWORD Document
|
|||
|
1101 WDICT HPWORD Hyphenation Dictionary
|
|||
|
1102 WCONF HPWORD Configuration File
|
|||
|
1103 W2601 HPWORD Attended Printer Environment
|
|||
|
1110 PCELL IFS/3000 Character Cell File
|
|||
|
1111 PFORM IFS/3000 Form File
|
|||
|
1112 PENV IFS/3000 Environment File
|
|||
|
1113 PCCMP IFS/3000 Compiled Character Cell File
|
|||
|
1114 RASTR Graphics Image in RASTER Format
|
|||
|
1130 OPTLF OPT/3000 Log File
|
|||
|
1131 TEPES TEPE/3000 Script File
|
|||
|
1132 TEPEL TEPE/3000 Log File
|
|||
|
1133 SAMPL APS/3000 Log File
|
|||
|
1139 MPEDL MPEDCP/DRP Log File
|
|||
|
1140 TSR HPToolset Root File
|
|||
|
1141 TSD HPToolset Data File
|
|||
|
1145 DRAW Drawing File for HPDRAW
|
|||
|
1146 FIG Figure File for HPDRAW
|
|||
|
1147 FONT Reserved
|
|||
|
1148 COLOR Reserved
|
|||
|
1149 D48 Reserved
|
|||
|
1152 SLATE Compressed SLATE File
|
|||
|
1153 SLATW Expanded SLATE Work File
|
|||
|
1156 DSTOR RAPID/3000 DICTDBU Utility Store File
|
|||
|
1157 TCODE Code File for Transact/3000 Compiler
|
|||
|
1158 RCODE Code File for Report/3000 Compiler
|
|||
|
1159 ICODE Code File for Inform/3000 Compiler
|
|||
|
1166 MDIST HPDESK Distribution list
|
|||
|
1167 MTEXT HPDESK Text
|
|||
|
1168 MARPA ARPA Messages File
|
|||
|
1169 MARPD ARPA Distribution List
|
|||
|
1170 MCMND HPDESK Abbreviated Commands File
|
|||
|
1171 MFRTM HPDESK Diary Free Time List
|
|||
|
1172 None Reserved
|
|||
|
1173 MEFT HPDESK External File Transfer Messages File
|
|||
|
1174 MCRPT HPDESK Encrypted Item
|
|||
|
1175 MSERL HPDESK Serialized (Composite) Item
|
|||
|
1176 VCSF Version Control System File
|
|||
|
1177 TTYPE Terminal Type File
|
|||
|
1178 TVFC Terminal Vertical Format Control File
|
|||
|
1192 NCONF Network Configuration File
|
|||
|
1193 NTRAC Network Trace File
|
|||
|
1194 NTLOG Network Log File
|
|||
|
1195 MIDAS Reserved
|
|||
|
1211 NDIR Reserved
|
|||
|
1212 INODE Reserved
|
|||
|
1213 INVRT Reserved
|
|||
|
1214 EXCEP Reserved
|
|||
|
1215 TAXON Reserved
|
|||
|
1216 QUERF Reserved
|
|||
|
1217 DOCDR Reserved
|
|||
|
1226 VC VC File
|
|||
|
1227 DIF DIF File
|
|||
|
1228 LANGD Language Definition File
|
|||
|
1229 CHARD Character Set Definition File
|
|||
|
1230 MGCAT Formatted Application Message Catalog
|
|||
|
1236 BMAP Base Map Specification File
|
|||
|
1242 BDATA BASIC Data File
|
|||
|
1243 BFORM BASIC Field Order File for VPLUS
|
|||
|
1244 BSAVE BASIC Saved Program File
|
|||
|
1245 BCNFG Configuration File for Default Option BASIC Program
|
|||
|
1246 BKEY
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Function Key Definition File for Terminal
|
|||
|
1247 BSVXL Business Basic/XL Program File
|
|||
|
1248 BDTXL Business Basic/XL Data File
|
|||
|
1249 BDNCM Business Basic/V Binary File
|
|||
|
1258 PFSTA Pathflow Static File
|
|||
|
1259 PFDYN Pathflow Dynamic File
|
|||
|
1270 RFDCA Revisable Form DCA Data Stream
|
|||
|
1271 FFDCA Final Form DCA Data Stream
|
|||
|
1272 DIU Document Interchange Unit File
|
|||
|
1273 PDOC HPWORD/150 Document
|
|||
|
1275 DFI DISOSS Filing Information File
|
|||
|
1276 SRI Search Restart Information File
|
|||
|
1401 CWPTX Chinese Word Processor Text File
|
|||
|
1421 MAP HPMAP/3000 Map Specification File
|
|||
|
1422 GAL Reserved
|
|||
|
1425 TTX Reserved
|
|||
|
1428 RDIC HP Business Report Writer (BRW) Dictionary File CM
|
|||
|
1429 RSPEC BRW Specification File
|
|||
|
1430 RSPCF BRW Specification File
|
|||
|
1431 REXEC BRW Execution File
|
|||
|
1432 RJOB BRW Report Job File
|
|||
|
1433 ROUTI BRW Intermediate Report File
|
|||
|
1434 ROUTD BRW Dictionary OUTPUT
|
|||
|
1435 PRINT BRW Print File
|
|||
|
1436 RCONF BRW Configuration File
|
|||
|
1437 RDICN BRW NM Dictionary File
|
|||
|
1438 REXNM BRW NM Execution File
|
|||
|
1441 PIF Reserved
|
|||
|
1461 NMOBT Native Mode Object File
|
|||
|
1462 PASLB Pascal Source Library
|
|||
|
1476 TIFF TAG Image File Format
|
|||
|
1477 RDF Revisable Document Format
|
|||
|
1478 SOF Serial Object File
|
|||
|
1479 GPH Chart File for Charting Gallery Chart
|
|||
|
1480 GPD Data File for Charting Gallery Chart
|
|||
|
1483 VCGPM Virtuoso Code Generator Proccessed Micro File
|
|||
|
1484 FRMAT Formatter
|
|||
|
1485 DUMP Dump Files Created and used by IDAT and DPAN
|
|||
|
1486 NWMD0 New Wave Mail Distribution List
|
|||
|
1491 X4HDR X.400 Header for HPDesk Manager
|
|||
|
1500 WP1 Reserved
|
|||
|
1501 WP2 Reserved
|
|||
|
1502 LO123 Lotus 123 Spread Sheet
|
|||
|
1514 FPCF Form Tester Command Spec File
|
|||
|
1515 INSP Spooler XL Input Spool File
|
|||
|
1516 OUTSP Spooler XL Output Spool File
|
|||
|
1517 CHKSP Spooler XL Checkpoint File
|
|||
|
1521 DSKIT HPDesk Intrinsics Transaction File
|
|||
|
1526 MSACK Mail Server Acknowledgement
|
|||
|
1527 MSNDN Mail Server Non-Delivery Notification
|
|||
|
1528 MSTRC Mail Server Trace File
|
|||
|
3333 Reserved
|
|||
|
|
|||
|
Briefly I would like to explain the directory structure under MPE. The
|
|||
|
structure is very bizarre, but not as bad as VMS. In MPE you have accounts
|
|||
|
and groups, the groups are sub-directories so to speak of, of the accounts.
|
|||
|
The accounts are separate entities in that one account cannot be directly
|
|||
|
logged to from another account. For example if you are under the SYS account
|
|||
|
you can look at files in the COGNOS account, but you cannot change directories
|
|||
|
to the COGNOS account. The account you start off in is your working account/
|
|||
|
directory. (Note: There is no true directory structure under MPE, but the
|
|||
|
allegory may help out some readers.) The same principle holds true most of the
|
|||
|
time for groups except under the latter versions of MPE XL where a CHGROUP
|
|||
|
command has been added. This command allows you to change groups. i.e.
|
|||
|
|
|||
|
CHGROUP PRIVATE/SECRET
|
|||
|
|
|||
|
Explanation of above
|
|||
|
^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
chgroup = The command to change groups
|
|||
|
private = The group name switched to
|
|||
|
/ = separator
|
|||
|
secret = This is the password to the group private
|
|||
|
|
|||
|
This is simple enough and really needed no explanation, but we need to be
|
|||
|
christian even to the slow ones. The next most important command is listf
|
|||
|
this will give a files listing and has various differant combinations and
|
|||
|
parameters, but I wont go into it basically there are 3 parameters you need
|
|||
|
to know.
|
|||
|
|
|||
|
LISTF @.@.@,-3
|
|||
|
|
|||
|
Explanation of Above (needed)
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
LISTF = Command to list files
|
|||
|
@ = 1st @ is the wildcard in the file specification slot
|
|||
|
@ = 2nd @ is the wildcard in the group specification slot
|
|||
|
@ = 3rd @ is the wildcard in the account specification slot
|
|||
|
, = separator
|
|||
|
-3 = parameter which will list the lockword on a file if any
|
|||
|
|
|||
|
The other parameters are these -3 is for MPE XL only and will list the
|
|||
|
lockword if the file is password protected more on this later. The -2
|
|||
|
specification will list the lockword under MPE. The 1 specification will
|
|||
|
list the account/group the file is under good for doing searches and getting
|
|||
|
more information.
|
|||
|
|
|||
|
Examples of LISTF
|
|||
|
^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
LISTF @.PUB.SYS = lists all files in the group pub under the account sys
|
|||
|
|
|||
|
LISTF LIST@.@.@,1 = will list all files and accounts/groups that thier in; that
|
|||
|
begin with the word list this is how you will have to
|
|||
|
search for a listfile or listtext program since MPE
|
|||
|
doesn't provide one for you. Otherwise you won't be able
|
|||
|
to type text files to the screen.
|
|||
|
|
|||
|
LISTF ?????UDC.@.ROBELLE,1 = this will search for anything beginning with 5
|
|||
|
alphanumeric characters and ending with UDC
|
|||
|
under the account robelle the '?' is the wildcard
|
|||
|
for single alphanumerics.
|
|||
|
|
|||
|
File Security Provisions
|
|||
|
^^^^^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
ALTSEC is the command to modify RWX permissions on a file or device.
|
|||
|
To modify security on a file you would simply do the following.
|
|||
|
|
|||
|
ALTSEC FILENAME;ACCESS=(RWX:CR;R:ANY)
|
|||
|
|
|||
|
Explanation of Above
|
|||
|
^^^^^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
ALTSEC = Command to modify security provisions
|
|||
|
FILENAME = The file simply
|
|||
|
; = Separator
|
|||
|
ACCESS= = What you are specifying
|
|||
|
( = Open Parenthesis for permissions
|
|||
|
RWX:CR = Read, Write, Execute for the creator
|
|||
|
R:ANY = Read any user
|
|||
|
) = Close parenthesis for permissions
|
|||
|
|
|||
|
This is basically simple enough below follows the mode types i.e. RWX,
|
|||
|
and a second chart for user types.
|
|||
|
|
|||
|
Mode Types
|
|||
|
==========
|
|||
|
R = Read
|
|||
|
W = Write
|
|||
|
X = Execute
|
|||
|
L = Lock
|
|||
|
A = Append
|
|||
|
|
|||
|
Note: both lock and append privs' are granted with W (write) privelege.
|
|||
|
|
|||
|
User Types
|
|||
|
==========
|
|||
|
ANY = Any user
|
|||
|
AC = Account members only
|
|||
|
GU = Group members only
|
|||
|
AL = Account Librarian
|
|||
|
|
|||
|
HP3000 EDIT/3000
|
|||
|
^^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
The HP3000 editor basically sucks but it will always be there if you
|
|||
|
need it so here goes.
|
|||
|
|
|||
|
:EDITOR
|
|||
|
|
|||
|
Now you should be in the editor the commands that follow are the most
|
|||
|
useful a full editor command list will be in the end of this portion you
|
|||
|
can play with the others if you want to.
|
|||
|
|
|||
|
ADD - Begins editing section this adds lines to an existing file or
|
|||
|
creates a new one.
|
|||
|
END - Exits the editor.
|
|||
|
KEEP - This saves your work format; "KEEP FILENAME".
|
|||
|
// - This puts you back into command mode.
|
|||
|
TEXT - This loads a file into the editor format; "TEXT FILENAME"
|
|||
|
LIST - This lists the file examples...
|
|||
|
1. LIST X - lists x line number.
|
|||
|
2. LIST X/Y - lists range of numbers x -> y.
|
|||
|
3. LIST ALL - lists everything
|
|||
|
MODIFY - This modifies a line number see below for explanation.
|
|||
|
XPLAIN - Help on editor commands format; "XPLAIN MODIFY".
|
|||
|
DELETE - Deletes lines.
|
|||
|
JOIN - Imports/adds another text file to the existing file in memory.
|
|||
|
GATHER - Move lines and fix's line numbers.
|
|||
|
|
|||
|
The HP3000 editor uses basic conventions with Delete, List, etc... in
|
|||
|
form listed above i.e. LIST 1, 2, and 3. These conventions apply to all
|
|||
|
commands where applicable. To insert lines in the middle of text you
|
|||
|
can add 6.1 or 6.01 or 6.001. Then use the gather command to resort the
|
|||
|
line numbers into integers.
|
|||
|
|
|||
|
The modify command is very archaic to say the least for example their
|
|||
|
are three primary commands D, I, R which are Delete, Insert, Replace
|
|||
|
respectively; These commands are sub-commands of modify. Here is how
|
|||
|
it works...
|
|||
|
|
|||
|
MODIFY X
|
|||
|
|
|||
|
now let's say X says, "sakdfjs HAck or Dei"
|
|||
|
to correct this line we would do the following
|
|||
|
|
|||
|
MODIFY X
|
|||
|
sakdfjs HAck or DEi
|
|||
|
d d <C/R> (This deletes a range of letters)
|
|||
|
HAck or Dei
|
|||
|
ra <C/R> (This replaces A with the letter a)
|
|||
|
Hack or Dei
|
|||
|
d <C/R> (This deletes the i)
|
|||
|
Hack or De
|
|||
|
ii <C/R> (This inserts an i)
|
|||
|
|
|||
|
Now this is very painful and takes time to get used to, but I never
|
|||
|
said the editor was good. Many HP's have other editors besides
|
|||
|
EDIT/3000, but to explain them all would be too time-consuming. The
|
|||
|
best or my favorite is QEDIT which can be found in the robelle account
|
|||
|
if it is there. A nice shortcut is that editor commands can be
|
|||
|
abbreviated i.e. T filename as opposed to text filename. This makes it
|
|||
|
a little better, but not much.
|
|||
|
|
|||
|
Screen Blanking
|
|||
|
^^^^^^^^^^^^^^^
|
|||
|
|
|||
|
This is basically a stupid trick but a nice way to keep people from
|
|||
|
watching over your shoulder. Here is how it goes.
|
|||
|
|
|||
|
ESC ;
|
|||
|
|
|||
|
This makes everything you type not echo.
|
|||
|
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
Unfortunatly the finalized version of this file was wiped, therefore
|
|||
|
this is the shortened version. I didn't want to re-type the rest of it.
|
|||
|
It wouldn't meet the deadline.
|
|||
|
|
|||
|
Malefactor!
|
|||
|
|
|||
|
[Editors Note: The second part of this file should come out into a later
|
|||
|
issue. -JD ]
|
|||
|
|
|||
|
|
|||
|
/ /
|
|||
|
/ NIA073 / File 08 /
|
|||
|
/ HoHoCon/XmasCon '91 /
|
|||
|
/ Santa Claus /
|
|||
|
/ /
|
|||
|
|
|||
|
|
|||
|
NIA & Phrack Magazine, & dFx International Digest Are Proud To Present:
|
|||
|
|
|||
|
|
|||
|
The Second Annual
|
|||
|
|
|||
|
X M A S C O N
|
|||
|
|
|||
|
|
|||
|
Who: All Hackers, Journalists, Security Personnel, Federal Agents, Lawyers,
|
|||
|
Authors and Other Interested Parties.
|
|||
|
|
|||
|
Where: Houston Airport Hilton Inn
|
|||
|
500 North Belt East
|
|||
|
Houston, Texas 77060
|
|||
|
U.S.A.
|
|||
|
Tel: (713) 931-0101
|
|||
|
Fax: (713) 931-3523
|
|||
|
|
|||
|
When: Friday December 27 through Sunday December 29, 1991
|
|||
|
|
|||
|
|
|||
|
Yes, ladies and gentlemen, you read it right... Xmascon has returned! This
|
|||
|
will undoubtedly be the telecom event of the year. Unlike certain conferences
|
|||
|
in the past, Xmascon 91 has a devoted and dedicated staff who are putting in
|
|||
|
an unmentionable ammount of time to ensure a large, vast and organized
|
|||
|
collection of some of the most diversified people in the telecommunications
|
|||
|
world. The event will be open to the public so that anyone may attend and
|
|||
|
learn more about the different aspects of computer security.
|
|||
|
|
|||
|
|
|||
|
Hotel Information
|
|||
|
-----------------
|
|||
|
|
|||
|
The Houston Airport Hilton Inn is located about 6 miles from Intercontinental
|
|||
|
Airport. The Xmascon group room rates are $49.00 plus tax (15%) per night,
|
|||
|
your choice of either single or double. There are also 7 suites availble, the
|
|||
|
prices of which vary from $140 to $250. You can call the hotel to find out
|
|||
|
the differences and availability of the suites, and you will also NEED to
|
|||
|
tell them you are with the Xmascon Conference to receive the reduced room
|
|||
|
rate, otherwise, you will be paying $69.00. There is no charge for children,
|
|||
|
regardless of age, when they occupy the same room as their parents. Specially
|
|||
|
designed rooms for the handicapped are available. The hotel provides free
|
|||
|
transportation to and from the airport, as well as neighbouring Greenspoint
|
|||
|
Mall, every 30 minutes on the hour, and on call, if needed. There are 2
|
|||
|
restaurants in the hotel. The Wicker Works is open until 11:00 pm, and The
|
|||
|
Forty Love is open 24 Hours. There will also be breakfast, lunch and dinner
|
|||
|
buffets each day. There is a piano bar, The Cycle Club, as well as a sports
|
|||
|
bar, Chaps, which features numerous table games, large screen tv, and a disco
|
|||
|
with a DJ. Within the hotel compound, there are 3 pools, 2 of which are
|
|||
|
indoors, a jacuzzi, a miniature golf course, and a fully equipped health club
|
|||
|
which features universal weights, a whirlpool and sauna. A car rental agency
|
|||
|
is located in the hotel lobby, and you can arrange to pick your car up at
|
|||
|
either the airport or the hotel. Xmascon attendees are entitled to a
|
|||
|
discounted rate. Contact the hotel for more information.
|
|||
|
|
|||
|
Xmascon will last 3 days, with the main conference being held on Saturday,
|
|||
|
December 28, in the Osage meeting room, starting at 12:00 p.m. and continuing
|
|||
|
on throughout the evening. This year, we have our own complete wing of the
|
|||
|
hotel, which is housed around a 3,000 square foot atrium ballroom. The wing
|
|||
|
is completely seperated from the rest of the hotel, so we are strongly
|
|||
|
encouraging people to make their reservations as far in advance as possible
|
|||
|
to enusre themselves a room within our area.
|
|||
|
|
|||
|
Why To Contact Us, And How To Do It
|
|||
|
-----------------------------------
|
|||
|
|
|||
|
We are hoping to have a number of people speak on a varied assortment of
|
|||
|
topics. If you would like to speak, please contact us as soon as possible and
|
|||
|
let us know who you are, who you represent (if anyone), the topic you wish to
|
|||
|
speak on, a rough estimate of how long you will need, and whether or not you
|
|||
|
will be needing any audio-visual aids.
|
|||
|
|
|||
|
There will be a display case inside the meeting room which will hold items of
|
|||
|
telecom interest. Specific items that will be available, or that we hope to
|
|||
|
have, include the first issues of 2600, Tap, Mondo 2000, and other magazines,
|
|||
|
non-computer related magazines that feature articles of interest, a wide
|
|||
|
array of boxes, the Quaker Oats 2600 mhz whistle, The Metal AE, etc. We will
|
|||
|
also have a VCR and monitor set up, so if you have any interesting videos
|
|||
|
(such as the Unsolved Mysteries show featuring Kevin Poulsen), or if you have
|
|||
|
anything you think people would enjoy having the chance to see, please let us
|
|||
|
know ahead of time, and tell us if you will need any help getting it to the
|
|||
|
conference. If all else fails, just bring it to the con and give it to us
|
|||
|
when you arrive.
|
|||
|
|
|||
|
Media support has been very strong so far. Publications that have agreed to
|
|||
|
print pre-conference announcements and stories include Computer World, Info
|
|||
|
World, New York Times, San Francisco Chronicle, Austin Chronicle, Houston
|
|||
|
Chronicle, Independent Journal, Mondo 2000, CuD, Informatik, a leading
|
|||
|
Japanese computer magazine, NME, Regeneration (Germany), and a few other
|
|||
|
European based magazines. PBS stations WHNY, WNET, and KQED, as well as the
|
|||
|
stations that carry their syndicated shows, will be mentioning the conference
|
|||
|
also. If you are a journalist and would like to do a story on Xmascon 91, or
|
|||
|
know someone who would, contact us with any questions you may have, or feel
|
|||
|
free to use and reprint any information in this file.
|
|||
|
|
|||
|
If anyone requires any additional information, needs to ask any questions,
|
|||
|
wants to RSVP, or would like to be added to the mailing list to receive the
|
|||
|
Xmascon updates, you may write to either myself (Drunkfux), Judge Dredd, or
|
|||
|
Lord Macduff via Internet at:
|
|||
|
|
|||
|
nia@nuchat.sccsi.com
|
|||
|
|
|||
|
Or via US Mail at:
|
|||
|
|
|||
|
Hard Data Corporation
|
|||
|
ATTN: HoHo
|
|||
|
P.O. Box 60695
|
|||
|
Houston, Texas
|
|||
|
77205-9998
|
|||
|
U.S.A.
|
|||
|
|
|||
|
|
|||
|
We will hopefully have an 800 mailbox before the next update is sent out. If
|
|||
|
someone cares to donate a decent one, that will stay up throughout the end of
|
|||
|
the year, please let us know. We should also be listing a few systems as an
|
|||
|
alternative form of reaching us.
|
|||
|
|
|||
|
|
|||
|
Xmascon 91 will be a priceless learning experience for professionals, and
|
|||
|
gives journalists a chance to gather information and ideas direct from the
|
|||
|
source. It is also one of the very few times when all the members of the
|
|||
|
computer underground can come together for a realistic purpose. We urge
|
|||
|
people not to miss out on an event of this caliber, which doesn't happen very
|
|||
|
often. If you've ever wanted to meet some of the most famous people from the
|
|||
|
hacking community, this may be your one and only chance. Don't wait to read
|
|||
|
about it in all the magazines, and then wish you had attended, make your
|
|||
|
plans to be there now! Be a part of our largest and greatest conference ever.
|
|||
|
|
|||
|
|
|||
|
Remember, to make your reservations, call (713) 931-0101 and tell them you're
|
|||
|
with Xmascon.
|
|||
|
|
|||
|
|
|||
|
"In closing... if you miss this one, you're only cheating yourself."
|
|||
|
-- Drunkfux
|
|||
|
|
|||
|
|
|||
|
---cut here---
|
|||
|
|
|||
|
This is the famous HoHoCow,
|
|||
|
** we know of no other cow which
|
|||
|
/\ costs so much to keep at HoHo. Our
|
|||
|
**** exclusive beechwood grazing produces
|
|||
|
(00) a Mooo-ability, smellabiltiy, and
|
|||
|
/-------\/ a milkability you will find in no
|
|||
|
/ |h0h0 || other cow in any other state!
|
|||
|
* ||W---|| --The CowWeiser Creed
|
|||
|
^^ ^^
|
|||
|
Dadadadaa!
|
|||
|
Its H0H0C0W (wha'd ya'll 'spect? Yer comin' to Texas!)
|
|||
|
(C)Special SantaClausASCII Graphix
|
|||
|
|
|||
|
---cut here---
|
|||
|
|
|||
|
|
|||
|
---paste here---
|
|||
|
=============================================================================
|
|||
|
|
|||
|
/ /
|
|||
|
/ NIA073/ File 09 /
|
|||
|
/ Editor's Comments /
|
|||
|
/ JD & LMcD /
|
|||
|
/ /
|
|||
|
|
|||
|
Well, another issue out the gateway here at NIA. Things have been
|
|||
|
rather hectic here, with the Xmascon planning, Lord Macduff's new baby and
|
|||
|
classes starting again. We hope you enjoy this issue, and look for another
|
|||
|
around the first of the new year.
|
|||
|
|
|||
|
We'd like to take this chance to ask the readers for their submissions,
|
|||
|
questions comments, donations of used equipment, and anything else they may
|
|||
|
care to send. Please direct all items to nia@nuchat.sccsi.com.
|
|||
|
|
|||
|
Back issues of NIA and first releases of new issues can be obtained
|
|||
|
from the CuD archive servers (Refer: CuD Magazine) ftp.cs.widener.edu and
|
|||
|
EFF archive server (Refer: EFF Magazine) eff.org. Also a bbs entitled
|
|||
|
Internal Affairs (HOUTX), TTR (TinselTown Rebellion Node 2 @ 713.952.7971),
|
|||
|
RipCo BBS (1.312.528.5020), Blitzkrieg (TAP) and the current Phrack home
|
|||
|
archives the magazine.
|
|||
|
|
|||
|
I thank the contributers who have been sending in donations in the
|
|||
|
way of files, hardware, information and other things. Please keep on doing
|
|||
|
so. In addition, Len Rose has a fund, please contact EFF (Refer:
|
|||
|
eff@eff.org / 617.864.0665) to donate.
|
|||
|
|
|||
|
We look forward to seeing all of you at HoHoCon, and urge you to make
|
|||
|
your reservations _now_. The hotel has been filling up quickly and there are
|
|||
|
only a few rooms left (Refer: NIA073 / File 07).
|
|||
|
|
|||
|
"There's nothing worse than a bad haircut. You go around looking like a
|
|||
|
dork...half apologizing always self concious, totally out of your groove for
|
|||
|
about a week. But at least you're reading NIA."
|
|||
|
- C.N. 11/16/91
|
|||
|
|
|||
|
Keep The Faith,
|
|||
|
JD & LMcD
|
|||
|
Ignorance, There Is No Excuse.
|
|||
|
<eof>
|
|||
|
|
|||
|
|